Retrieval of relevant historical data triage operations in security operation centers

T Lin, C Zhong, J Yen, P Liu - From Database to Cyber Security: Essays …, 2018 - Springer
Triage analysis is a fundamental stage in cyber operations in Security Operations Centers
(SOCs). The massive data sources generate great demands on cyber security analysts' …

A cyber security data triage operation retrieval system

C Zhong, T Lin, P Liu, J Yen, K Chen - Computers & Security, 2018 - Elsevier
Data triage is a fundamental stage of cyber defense analysis for achieving cyber situational
awareness in a Security Operations Center (SOC). It has a high requirement for cyber …

Learning from experts' experience: toward automated cyber security data triage

C Zhong, J Yen, P Liu, RF Erbacher - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
Security operations centers (SOCs) employ various cyber defend measures to monitor
network events. Apart from these measures, SOCs also have to resort to human analysts to …

Studying analysts' data triage operations in cyber defense situational analysis

C Zhong, J Yen, P Liu, RF Erbacher, C Garneau… - Theory and models for …, 2017 - Springer
Cyber defense analysts are playing a critical role in Security Operations Centers (SOCs) to
make sense of the immense amount of network monitoring data for detecting and …

ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis

C Zhong, J Yen, P Liu, R Erbacher… - … Cognitive Methods in …, 2015 - ieeexplore.ieee.org
Efficiency and interference shielding are critical factors for conducting successful cognitive
task analysis (CTA) of cyber-attack analysis. To achieve this goal, a tool, named ARSCA, is …

AOH-map: A mind mapping system for supporting collaborative cyber security analysis

C Zhong, A Alnusair, B Sayger… - 2019 IEEE Conference …, 2019 - ieeexplore.ieee.org
Cyber Security Operations Centers (CSOCs) have been widely built in organizations for
intrusion detection and incident response. Cyber security analysts play a critical role in …

Computer-aided human centric cyber situation awareness

M Albanese, N Cooke, G Coty, D Hall, C Healey… - Theory and models for …, 2017 - Springer
In this chapter, we provide an overview of Cyber Situational Awareness, an emerging
research area in the broad field of cyber security, and discuss, at least at a high level, how to …

Can cyber operations be made autonomous? an answer from the situational awareness viewpoint

C Zhong, J Yen, P Liu - Adaptive Autonomous Secure Cyber Systems, 2020 - Springer
Although many building blocks of today's cyber-defense solutions are already fully
automatic, there is still a debate on whether next-generation cyber-defense solutions should …

Cognitive process

J Yen, RF Erbacher, C Zhong, P Liu - Cyber Defense and Situational …, 2014 - Springer
The previous chapter showed that our understanding about the cognitive reasoning process
of cyber analysts is rather limited. Here, we focus on ways to close this knowledge gap. This …

Situation mining: Event pattern mining for situation model induction

A Salfinger - 2019 IEEE Conference on Cognitive and …, 2019 - ieeexplore.ieee.org
Computational situation assessment (SA) systems support human control center operators
in situation monitoring, ie, detecting and tracking relevant object and event constellations in …