Security operations center: A systematic study and open challenges
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …
importance has grown significantly, especially over the last five years. This is mainly due to …
A systematic mapping study on intrusion alert analysis in intrusion detection systems
AA Ramaki, A Rasoolzadegan, AG Bafghi - ACM computing surveys …, 2018 - dl.acm.org
Intrusion alert analysis is an attractive and active topic in the area of intrusion detection
systems. In recent decades, many research communities have been working in this field …
systems. In recent decades, many research communities have been working in this field …
Captain: community-based advanced persistent threat analysis in it networks
AA Ramaki, A Ghaemi-Bafghi… - International Journal of …, 2023 - Elsevier
Organizations that possess valuable information assets and critical infrastructure are prone
to Advanced Persistent Threats (APTs). The life cycle of this type of modern attack consists of …
to Advanced Persistent Threats (APTs). The life cycle of this type of modern attack consists of …
Agent-based approach to the design of a multimodal interface for cyber-security event visualisation control
Convenient human-computer interaction is essential to carry out many exhausting and
concentration-demanding activities. One of them is cyber-situational awareness as well as …
concentration-demanding activities. One of them is cyber-situational awareness as well as …
Utilisation of embodied agents in the design of smart human–computer interfaces—A Case Study in Cyberspace Event Visualisation Control
The goal of the research reported here was to investigate whether the design methodology
utilising embodied agents can be applied to produce a multi-modal human–computer …
utilising embodied agents can be applied to produce a multi-modal human–computer …
[PDF][PDF] Interactive visualization of event logs for cybersecurity
BCM Cappers - 2018 - research.tue.nl
I remember the day well when I entered Jack'so ce four years ago. As a Master student in
Software Engineering I was looking for a supervisor in visualization to support me in the …
Software Engineering I was looking for a supervisor in visualization to support me in the …
Designing a Vulnerability Management Dashboard to Enhance Security Analysts' Decision Making Processes
Network vulnerability management reduces threats posed by weaknesses in software,
hardware, or organizational practices. As networks and related threats grow in size and …
hardware, or organizational practices. As networks and related threats grow in size and …
[PDF][PDF] Hack the Bank and Best Practices for Secure Bank
Financial institutions are tremendous targets of opportunity for electronic thievery.
Intermingled threats, improvements to man-in-the-middle or browser exploits, and advances …
Intermingled threats, improvements to man-in-the-middle or browser exploits, and advances …
[PDF][PDF] Agentowa struktura wielomodalnego interfejsu do Narodowej Platformy Cyberbezpieczeństwa, część 1
W Kasprzak, W Szynkiewicz… - Pomiary Automatyka …, 2019 - bibliotekanauki.pl
Ten dwuczęściowy artykuł przedstawia interfejs do Narodowej Platformy
Cyberbezpieczeństwa (NPC). Wykorzystuje on gesty i komendy wydawane głosem do …
Cyberbezpieczeństwa (NPC). Wykorzystuje on gesty i komendy wydawane głosem do …
Research on Computer Large-screen Information System and System Software Operating Mechanism of Gymnasiums
X Zheng - 2021 IEEE International Conference on Advances in …, 2021 - ieeexplore.ieee.org
The paper presents the overall design scheme of the large-screen display and monitoring
system for sports competition venues. The event system adopts the C/S structure mode, and …
system for sports competition venues. The event system adopts the C/S structure mode, and …