FAIXID: A framework for enhancing AI explainability of intrusion detection results using data cleaning techniques
Organizations depend on heavy use of various cyber defense technologies, including
intrusion detection and prevention systems, to monitor and protect networks and devices …
intrusion detection and prevention systems, to monitor and protect networks and devices …
[图书][B] Reinforcement learning for cyber-physical systems: with cybersecurity case studies
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was
inspired by recent developments in the fields of reinforcement learning (RL) and cyber …
inspired by recent developments in the fields of reinforcement learning (RL) and cyber …
Vulcon: A system for vulnerability prioritization, mitigation, and management
Vulnerability remediation is a critical task in operational software and network security
management. In this article, an effective vulnerability management strategy, called VULCON …
management. In this article, an effective vulnerability management strategy, called VULCON …
When should shelf stocking be done at night? A workforce management optimization approach for retailers
This research examines the economic viability of night shelf stocking in the retail industry. By
analyzing real data on the costs and benefits of both night and day stocking, we propose a …
analyzing real data on the costs and benefits of both night and day stocking, we propose a …
A novel team formation framework based on performance in a cybersecurity operations center
A Cybersecurity Operations Center (CSOC) performs various tasks to protect an
organization from cyber threats. Several types of personnel collaborate to function effectively …
organization from cyber threats. Several types of personnel collaborate to function effectively …
Network security technology of intelligent information terminal based on mobile internet of things
N Sun, T Li, G Song, H Xia - Mobile Information Systems, 2021 - Wiley Online Library
In the process of implementing the Internet of Things, the object itself has identity information
and identification equipment and encounters difficulties in communication security during …
and identification equipment and encounters difficulties in communication security during …
[HTML][HTML] A sequential deep learning framework for a robust and resilient network intrusion detection system
Ensuring the security and integrity of computer and network systems is of utmost importance
in today's digital landscape. Network intrusion detection systems (NIDS) play a critical role in …
in today's digital landscape. Network intrusion detection systems (NIDS) play a critical role in …
A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center
Cybersecurity operations centers (CSOCs) protect organizations by monitoring network
traffic and detecting suspicious activities in the form of alerts. The security response team …
traffic and detecting suspicious activities in the form of alerts. The security response team …
Malware in the future? Forecasting of analyst detection of cyber events
JZ Bakdash, S Hutchinson, EG Zaroukian… - Journal of …, 2018 - academic.oup.com
Cyberattacks endanger physical, economic, social, and political security. There have been
extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate …
extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate …
Research and challenges of reinforcement learning in cyber defense decision-making for intranet security
In recent years, cyber attacks have shown diversified, purposeful, and organized
characteristics, which pose significant challenges to cyber defense decision-making on …
characteristics, which pose significant challenges to cyber defense decision-making on …