Filters








3 Hits in 1.1 sec

Workflow Based Security Incident Management [chapter]

Meletis A. Belsis, Alkis Simitsis, Stefanos Gritzalis
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Our framework enhances the incident management process by allowing the law enforcement units to (a) collect the required evidence from incident data that are spread through a number of different incident  ...  management systems; (b) transform, clean, and homogenize them; and, finally, (c) load them to a central database management system.  ...  Providing a structure and an underline system that allows the sharing of incident information in a secure and controlled way is a vital requirement.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11573036_65">doi:10.1007/11573036_65</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jma6qff5tbeirndcjjx3z57os4">fatcat:jma6qff5tbeirndcjjx3z57os4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808041753/http://www.dbnet.ece.ntua.gr/pubs/uploads/TR-2005-21.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/fc/0ffc6480c2d679628038af2dc9e4b55ff85e7fe6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11573036_65"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Security Incident Data Model [chapter]

Meletis A. Belsis, Nick Godwin, Leon Smalov
<span title="">2002</span> <i title="Springer US"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kss7mrolvja63k4rmix3iynkzi" style="color: black;">IFIP Advances in Information and Communication Technology</a> </i> &nbsp;
This paper presents a security incident data model. The model uses many of the existing security incident taxonomies to organise its security incident related information.  ...  The operational actor could be a user or a process running on a host. In addition the incident may include a lot of compromised hosts (operational actors) that run malicious processes (i.e.  ...  These are: a Technique Id; a Technique Name; the Attack Type (from the above list) and a technical description field which is going to hold a technical description of the specific technique.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35586-3_38">doi:10.1007/978-0-387-35586-3_38</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/thgcdojfnzd6xjfllmwhsfadcq">fatcat:thgcdojfnzd6xjfllmwhsfadcq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180729004753/https://link.springer.com/content/pdf/10.1007%2F978-0-387-35586-3_38.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bc/49/bc4999d5e20f63eda7b7fca6173be308a9e58ffd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35586-3_38"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Building an Enterprise it Security Management System [chapter]

Meletis A. Belsis, Leonid Smalov
<span title="">2003</span> <i title="Springer US"> Security and Privacy in the Age of Uncertainty </i> &nbsp;
Moving towards a knowledge economy, managing effectively and safely the corporate data is the key to an organisation's survival and success.  ...  They will then download a java applet. After setting up the applet, it will open a connection to the database server.  ...  Describing such a decomposition process in one paper is impossible.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35691-4_16">doi:10.1007/978-0-387-35691-4_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ca4mnbgbojesze5yxnuxctvuc4">fatcat:ca4mnbgbojesze5yxnuxctvuc4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180718223450/https://link.springer.com/content/pdf/10.1007%2F978-0-387-35691-4_16.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/89/c7/89c71df2f40dcb4fde6b886ee7c3a0b22511231c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35691-4_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>