A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="http://www.dbnet.ece.ntua.gr/pubs/uploads/TR-2005-21.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
Filters
Workflow Based Security Incident Management
[chapter]
<span title="">2005</span>
<i title="Springer Berlin Heidelberg">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a>
</i>
Our framework enhances the incident management process by allowing the law enforcement units to (a) collect the required evidence from incident data that are spread through a number of different incident ...
management systems; (b) transform, clean, and homogenize them; and, finally, (c) load them to a central database management system. ...
Providing a structure and an underline system that allows the sharing of incident information in a secure and controlled way is a vital requirement. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11573036_65">doi:10.1007/11573036_65</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jma6qff5tbeirndcjjx3z57os4">fatcat:jma6qff5tbeirndcjjx3z57os4</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808041753/http://www.dbnet.ece.ntua.gr/pubs/uploads/TR-2005-21.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/fc/0ffc6480c2d679628038af2dc9e4b55ff85e7fe6.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11573036_65">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
springer.com
</button>
</a>
A Security Incident Data Model
[chapter]
<span title="">2002</span>
<i title="Springer US">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kss7mrolvja63k4rmix3iynkzi" style="color: black;">IFIP Advances in Information and Communication Technology</a>
</i>
This paper presents a security incident data model. The model uses many of the existing security incident taxonomies to organise its security incident related information. ...
The operational actor could be a user or a process running on a host. In addition the incident may include a lot of compromised hosts (operational actors) that run malicious processes (i.e. ...
These are: a Technique Id; a Technique Name; the Attack Type (from the above list) and a technical description field which is going to hold a technical description of the specific technique. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35586-3_38">doi:10.1007/978-0-387-35586-3_38</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/thgcdojfnzd6xjfllmwhsfadcq">fatcat:thgcdojfnzd6xjfllmwhsfadcq</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180729004753/https://link.springer.com/content/pdf/10.1007%2F978-0-387-35586-3_38.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/bc/49/bc4999d5e20f63eda7b7fca6173be308a9e58ffd.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35586-3_38">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
springer.com
</button>
</a>
Building an Enterprise it Security Management System
[chapter]
<span title="">2003</span>
<i title="Springer US">
Security and Privacy in the Age of Uncertainty
</i>
Moving towards a knowledge economy, managing effectively and safely the corporate data is the key to an organisation's survival and success. ...
They will then download a java applet. After setting up the applet, it will open a connection to the database server. ...
Describing such a decomposition process in one paper is impossible. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35691-4_16">doi:10.1007/978-0-387-35691-4_16</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ca4mnbgbojesze5yxnuxctvuc4">fatcat:ca4mnbgbojesze5yxnuxctvuc4</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180718223450/https://link.springer.com/content/pdf/10.1007%2F978-0-387-35691-4_16.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/89/c7/89c71df2f40dcb4fde6b886ee7c3a0b22511231c.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35691-4_16">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
springer.com
</button>
</a>