Filters








401 Hits in 5.1 sec

Planning the building a SOC - A Conceptual Process Model

Pierre Jacobs, Sebastiaan Von Solms
<span title="2022-06-08">2022</span> <i title="Academic Conferences International Ltd"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7kqsvjzsvzfdtbxmb2bvhylgyi" style="color: black;">Proceedings of the ... European conference on information warfare and security</a> </i> &nbsp;
There are few frameworks available to consult when building Security Operation Centers (SOCs). (P. Jacobs, 2015).  ...  For each of the steps in our conceptual model we have identified existing, public frameworks, standards or best practices.  ...  -MSSP Alert, no date)(C. Zimmerman and Operations Center, 2014) :  Monitoring -this service describes the near real time analysis of data from telemetry sources for potential threats.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.34190/eccws.21.1.247">doi:10.34190/eccws.21.1.247</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wvj4ynrsgbd5rjvogzyui2u5k4">fatcat:wvj4ynrsgbd5rjvogzyui2u5k4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220617085146/https://papers.academic-conferences.org/index.php/eccws/article/download/247/351" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/69/4169290eb6119cb0f362baecd42bb5ec11408f2a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.34190/eccws.21.1.247"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Cyber Risk and Financial Stability

Jennifer Elliott, Christopher Wilson, Tanai Khiaonarong, Nigel Jenkinson, Frank Adelmann, Anastasiia Morozova, Tamas Gaidosch, Nadine Schwarz, Ibrahim Ergen
<span title="">2020</span> <i title="International Monetary Fund (IMF)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jr27ugwhhbcsblhebfuytlqjge" style="color: black;">Staff Discussion Notes</a> </i> &nbsp;
Cyberattacks have been industrialized-for many operations there is an international division of work; there are markets for hacking services, vulnerability exchanges, specialist operators, and outsourcing  ...  In addition, the 2019 Singapore FSAP assessed cyber risk as a key part of financial stability analysis and stress testing, investigated an institutional framework for cybersecurity, and proposed two (out  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5089/9781513512297.006">doi:10.5089/9781513512297.006</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/adesb6u3drc4dmmyav7fxaynru">fatcat:adesb6u3drc4dmmyav7fxaynru</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210717000634/https://www.elibrary.imf.org/downloadpdf/journals/006/2020/007/006.2020.issue-007-en.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/a5/55a58489525d4a9dbee4143b41d26d1fe139ea1a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5089/9781513512297.006"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Smart Health and Cybersecurity in the Era of Artificial Intelligence [chapter]

A.K.M. Jahangir Alam Majumder, Charles B. Veilleux
<span title="2021-05-11">2021</span> <i title="IntechOpen"> Computer-Mediated Communication [Working Title] </i> &nbsp;
AI could aid in addressing Cybersecurity concerns to create a robust and secure Human-in-the-Loop system for mental health problems.  ...  The need for a transformation in providing healthcare has been recognized by organizations and captured in reports.  ...  We would also like to thank the anonymous reviewers for reviewing earlier drafts of this chapter.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/intechopen.97196">doi:10.5772/intechopen.97196</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yn4wipshwjfgfgiud3yp6k64py">fatcat:yn4wipshwjfgfgiud3yp6k64py</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210520040056/https://api.intechopen.com/chapter/pdf-download/76725.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/5e/115eb770ad2c9260dbe43ebd4601b2cd8a11c8c5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/intechopen.97196"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Integrated Security Framework for Private Cloud Computing On-Premise

Pedro Ramos Brandao
<span title="2020-12-01">2020</span> <i title="Science Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wake4w3hqzd4ndiy2zowpciv64" style="color: black;">Journal of Computer Science</a> </i> &nbsp;
It proposes an architectural analysis to incorporate a distinguish  ...  to a cybersecurity incident" (NIST, 2020) This structure has been adopted on a large scale by many organizations in the US and other countries.  ...  I also thank you for contributing to my Research Center of scientific affiliation: CIDEHUS of the University of Évora. Ethics This article is original and contains unpublished material.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/jcssp.2020.1796.1807">doi:10.3844/jcssp.2020.1796.1807</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ekvv2jmpzrbg7pbup7iy72xaju">fatcat:ekvv2jmpzrbg7pbup7iy72xaju</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210312065359/https://thescipub.com/pdf/jcssp.2020.1796.1807.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2a/8e/2a8e8069cb23c1b3def400b91f67508ee6fc0336.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/jcssp.2020.1796.1807"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs [article]

Elaine M. Sedenberg, James X. Dempsey
<span title="2018-05-31">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In recent years the cybersecurity policy debate in Washington has been dominated by calls for greater information sharing within the private sector, and between the private sector and the federal government  ...  This paper aims to bring granularity to implementations of information sharing initiatives by creating a taxonomy of the governance and policy models within each of these organizations.  ...  Acknowledgements This work was funded by a grant from the Hewlett Foundation through the Center for Long-Term Cybersecurity (CLTC) at the University of California, Berkeley and was further supported by  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1805.12266v1">arXiv:1805.12266v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4ytc2a4hxbgzfdaagmzucosmcu">fatcat:4ytc2a4hxbgzfdaagmzucosmcu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200824215022/https://arxiv.org/ftp/arxiv/papers/1805/1805.12266.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/81/a9/81a9c60e521094eae97d244e3e088febf0775ab0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1805.12266v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Institute Resilience Through Detection, Response, and Recovery [chapter]

Dan Blum
<span title="">2020</span> <i title="Apress"> Rational Cybersecurity for Business </i> &nbsp;
Enact response in a structured manner wherein each business function has a script for its part; for example, after a data breach, IT restores affected systems to normal operation, public relations communicates  ...  Strictly operational incidents such as hardware failures fall purely in the purview of the business continuity function.  ...  controls to prove they are operating correctly for compliance or assurance purposes • Monitoring activity against a baseline for anomaly detection: For example, alert on record spikes in network activity  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4842-5952-8_9">doi:10.1007/978-1-4842-5952-8_9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/52wtkyvlsvbv3d7kwcjmqlbl7e">fatcat:52wtkyvlsvbv3d7kwcjmqlbl7e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200813021420/https://link.springer.com/content/pdf/10.1007%2F978-1-4842-5952-8_9.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c4/8e/c48efc02162f54dfb762110e68c7e68ce0d3c88f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4842-5952-8_9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Prerequisites of Virtual Teamwork in Security Operations Centers: Knowledge, Skills, Abilities and Other Characteristics

Balázs Péter Hámornik, Csaba Krasznay
<span title="2017-03-31">2017</span> <i title="Academic and Applied Research in Military and Public Management Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kmuq3cvofzfejog3yjdvfj3ike" style="color: black;">Academic and Applied Research in Military and Public</a> </i> &nbsp;
Cybersecurity is an emerging field of national security where usually the technical aspects of defense take first place.  ...  Cyberdefense is heavily relaying on teamwork where members of Computer Emergency Response Team (CERT) or Computer Security Incident Response Team (CSIRT) or Security Operations Center (SOC) teams are often  ...  Security Operations Centers (SOCs) Security Operations Centers are defined as both a team and an organization unit, often operating in shifts around the clock.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32565/aarms.2017.3.5">doi:10.32565/aarms.2017.3.5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5pdqugenyrdahngoynjweoeamm">fatcat:5pdqugenyrdahngoynjweoeamm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220209200711/https://folyoirat.ludovika.hu/index.php/aarms/article/download/1553/870" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2d/65/2d65489ff6101d3611af374f5bbf65afe52ce2b9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32565/aarms.2017.3.5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Systematic Approach to Cyber Resilience Operationalization in SMEs

Juan Francisco Carias, Marcos R. S. Borges, Leire Labaka, Saioa Arrizabalaga, Josune Hernantes
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
This is especially true for the Small and Medium-sized Enterprises (SMEs) because they have limited resources to face the threats but, as a group, represent an extensive payload for cybercriminals to exploit  ...  evaluation from experts to validate the actions and put them in a logical order.  ...  The backgrounds of these experts are: one director of an industrial cybersecurity center, one chief operations officer from an industrial cybersecurity center, one data protection officer, one chief information  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3026063">doi:10.1109/access.2020.3026063</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/u5pogmzoc5cdnj3bt4w72ii3oa">fatcat:u5pogmzoc5cdnj3bt4w72ii3oa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107102614/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09204611.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ef/5a/ef5a18005b044af890229bfcfcd7d7ca65a505f3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3026063"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Security Operations Center - Prerequisite and Requirements

Tomaso Vasella
<span title="2019-04-18">2019</span> <i title="Zenodo"> Zenodo </i> &nbsp;
An SOC is a service center focused on the detection of and response to incidents. An SOC cannot work without functioning basic security mechanisms and a defined service mandate.  ...  The interplay between human resources, processes and technologies is particularly important for SOCs.  ...  So more and more organizations are relying on services offered by security operations centers (SOC) as part of their cybersecurity strategies, whether operating an SOC themselves or outsourcing the necessary  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3521990">doi:10.5281/zenodo.3521990</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rhgjafpjsjeejntie7x6sgyoxq">fatcat:rhgjafpjsjeejntie7x6sgyoxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307181944/https://zenodo.org/record/3521990/files/Security%20Operations%20Center%20-%20Prerequisite%20and%20Requirements.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dc/4f/dc4febdb840f5ad3f0be2d922540fe6e708341b5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3521990"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Security Operations Center: A Systematic Study and Open Challenges

Manfred Vielberth, Fabian Bohm, Ines Fichtinger, Gunther Pernul
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Each alert should go through an alert analysis process [194] in order to decide upon possible measures.  ...  Searching for "Security" AND "Operations" AND "Center" results in an immense number of papers, from which only a very small fraction is relevant to this study.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3045514">doi:10.1109/access.2020.3045514</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r4vg6qpezfc3nifsmu2qg22qxq">fatcat:r4vg6qpezfc3nifsmu2qg22qxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201220045215/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09296846.pdf?tp=&amp;arnumber=9296846&amp;isnumber=6514899&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/46/5e/465eff1d344852da03def420c29f84d1d36d591c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3045514"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Intrusion detection and Big Heterogeneous Data: a Survey

Richard Zuech, Taghi M Khoshgoftaar, Randall Wald
<span title="2015-02-27">2015</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pkhnkszyprhb3orbf6g7tqmgiu" style="color: black;">Journal of Big Data</a> </i> &nbsp;
Intrusion Detection has been heavily studied in both industry and academia, but cybersecurity analysts still desire much more alert accuracy and overall threat analysis in order to secure their systems  ...  Attempts to use more heterogeneous data sources pose an even greater Big Data challenge. Big Data technologies for Intrusion Detection can help solve these Big Heterogeneous Data challenges.  ...  Acknowledgements We thank the reviewers for their constructive comments. Received: 6 August 2014 Accepted: 28 January 2015  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s40537-015-0013-4">doi:10.1186/s40537-015-0013-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gkwznr3t5naznhc56nwkikimpm">fatcat:gkwznr3t5naznhc56nwkikimpm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808122655/https://journalofbigdata.springeropen.com/track/pdf/10.1186/s40537-015-0013-4?site=journalofbigdata.springeropen.com" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/4e/f14eeb2ea352298d658350568403c6cd0c1a9630.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s40537-015-0013-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

Cyber Threat Intelligence: A Product Without a Process?

Kris Oosthoek, Christian Doerr
<span title="2020-07-14">2020</span> <i title="Informa UK Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fsovk46yqbcvrmfcc6ihzylkbe" style="color: black;">The international journal of intelligence and counter intelligence</a> </i> &nbsp;
It can be argued that procuring a CTI feed is effectively partial outsourcing of intelligence analysis, which implies a trade-off in applicability and relevancy of analysis.  ...  In configurations like this, intelligence analysis gets effectively outsourced to the CTI provider, as the CTI is not seen by a human analyst.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1080/08850607.2020.1780062">doi:10.1080/08850607.2020.1780062</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rtfpy4sodfbanbvsephmmegbwe">fatcat:rtfpy4sodfbanbvsephmmegbwe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210609154521/https://www.tandfonline.com/doi/pdf/10.1080/08850607.2020.1780062?needAccess=true&amp;" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3f/e0/3fe08d893b1fcbbd49b8811c31a8bb60dd1451cf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1080/08850607.2020.1780062"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> tandfonline.com </button> </a>

Real-Time Attack Monitoring on Telecom Network Using Open-Source Darknet and Honeypot Setup

L. Sivakamy, S. Pradheepkumar, A. Sivabalan, Anand R. Prasad, NEC Technologies India Private Ltd, India, NEC Technologies India Private Ltd, India, NEC Technologies India Private Ltd, India, NEC Corporation, Japan
<span title="">2018</span> <i title="River Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ygvakwwlpvfrpb4j6w2wmjbwtm" style="color: black;">Journal of ICT Standardization</a> </i> &nbsp;
The analysis pertains to the origin of attacks and the approach of attacks (threat model).  ...  In this paper, we describe an experimental setup that leverages this property of the darknet in a network monitoring setup coupled with several honeypot servers.  ...  Anand has provided business and technical consultancy to start-ups, started an offshore development center based on his concept of cost effective outsourcing models and is involved in business development  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jicts2245-800x.524">doi:10.13052/jicts2245-800x.524</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7tns5onayjgbzottkq376hu47u">fatcat:7tns5onayjgbzottkq376hu47u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190429062730/https://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-800X_524.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/23/22/2322a4b69bbfedb7a1ddcedd291494e4be0b1a07.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jicts2245-800x.524"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Survey on Intrusion Detection Systems for Fog and Cloud Computing

Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, Anna Kobusińska
<span title="2022-03-13">2022</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hijy7jexkvcipg3tulqv73bck4" style="color: black;">Future Internet</a> </i> &nbsp;
The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations.  ...  Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems.  ...  The research in [48] conveyed a proposal for an IDS model for edge computing deployment and highlighted the demand for resource allocation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/fi14030089">doi:10.3390/fi14030089</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wxlz2xeduzdpvbyf63rwosal7e">fatcat:wxlz2xeduzdpvbyf63rwosal7e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220321032026/https://mdpi-res.com/d_attachment/futureinternet/futureinternet-14-00089/article_deploy/futureinternet-14-00089.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a1/ec/a1ec8c92c8386e7b72f2a172fe14f4b03c4b1138.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/fi14030089"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Davis Mirilla Dissertation on Impact Task Disengagement in Cyber Security.pdf

Davis Mirilla
<span title="2019-09-09">2019</span> <i title="figshare"> Figshare </i> &nbsp;
Response to cyber-attacks are still slow and high-profile breaches continue to rise and take center stage in global media coverage.  ...  These developments, however, have created opportunities for hacktivists, cyber-criminals and nation-state inspired cyber-attacks that have resulted in high-profile data breaches in government and commercial  ...  ACKNOWLEDGEMENTS In completing this work, I want to acknowledge the support I enjoyed from members of Faculty, Seidenberg College in Pace University, members of my family, my employers and a small but  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.9785363.v1">doi:10.6084/m9.figshare.9785363.v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/po66obagnjb6jgnqaso65hybw4">fatcat:po66obagnjb6jgnqaso65hybw4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200113052224/https://s3-eu-west-1.amazonaws.com/pfigshare-u-files/17544683/DavisMirillaDissertationonImpactTaskDisengagementinCyberSecurity.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/59/08599ad0892233924f0ff5c596f18b5da70b6fc7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.9785363.v1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> figshare.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 401 results