Filters








13,520 Hits in 11.8 sec

The Next Generation Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for Efficient Defense against Adversarial Attacks

Konstantinos Demertzis, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez, Lazaros Iliadis
2019 Big Data and Cognitive Computing  
It is a forensics tool for big data that can enhance the automate defense strategies of SOCs to effectively respond to the threats their environments face.  ...  The SOC staff works closely with incident response teams, security analysts, network engineers and organization managers using sophisticated data processing technologies such as security analytics, threat  ...  Acknowledgments: Nikos Tziritas's work was partly supported by the PIFI International Scholarship, Y75601. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/bdcc3010006 fatcat:qskf3u5xkfephh5tcis3ibo35i

Next Generation Internet of Things [chapter]

Ovidiu Vermesan, Joël Bacquet
2018 Next Generation Internet of Things  
The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed  ...  The projects present architectures, concepts, methods and tools for open IoT platforms integrating evolving sensing, actuating, energy harvesting, networking and interface technologies.  ...  Visual analytics tools for analysing threats in IoT ecosystem will be used.  ... 
doi:10.13052/rp-9788770220071 fatcat:bnyyfkhdzbghxetcwhisrqsapq

Welcome Message from the General Chair

2006 International Conference on Dependable Systems and Networks (DSN'06)  
Thanks to the efforts of programme committees, authors, and the VLDB Endowment over the years, VLDB conferences constitute today a prestigious scientific forum for the presentation and exchange of research  ...  We are grateful to all members of these committees for their time and efforts.  ...  Acknowledgements The contents presented in this document would not have been available to the attendees of the VLDB conference without the contributions of Mike Godfrey (MG) and Dave Wortman (DW), who  ... 
doi:10.1109/dsn.2006.75 dblp:conf/dsn/X06 fatcat:k4duddvbk5glboxkqxkkfsh4p4

The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence

Konstantinos Demertzis, Panayiotis Kikiras, Nikos Tziritas, Salvador Sanchez, Lazaros Iliadis
2018 Big Data and Cognitive Computing  
The fundamental aspects of an effective SOC is related to the ability to examine and analyze the vast number of data flows and to correlate several other types of events from a cybersecurity perception  ...  The supervision and categorization of network flow is an essential process not only for the scheduling, management, and regulation of the network's services, but also for attacks identification and for  ...  The ideal NGC2SOC includes advanced machine learning solutions for real-time analysis of both known and unknown threats; instant reports; data visualization tools; and other sophisticated solutions that  ... 
doi:10.3390/bdcc2040035 fatcat:cikpwm6xwjbxbio5exow3pigri

Security analytics of large scale streaming data [article]

Sheeraz Niaz Lighari
2018 The PhD Series of the Faculty of Engineering and Science  
These advanced techniques comes with the field of big data analytics, which becomes become big data security analytics in perspective of security. The security threats can be known or unknown.  ...  The known threats can be detected by looking at the signature or pattern of the attacks but it is difficult to detect unknown threats or attacks.  ... 
doi:10.5278/vbn.phd.eng.00047 fatcat:mewllh4hjzh3bjunk47gwkwa2q

SAKGP: Secure Authentication Key Generation Protocol in WLAN

Latha P.H, Vasantha R
2014 International Journal of Computer Applications  
Literatures also share evidence that such issues are yet unsolved and call for a serious modeling of issues and testing the security efficiencies.  ...  Hence, this study presents a technique that uses the most recent versions of cryptographic hash functions to ensure the bidirectional authentication between the nodes and WLAN router.  ...  The mathematical modeling considers finite internal state that considers bit stream of any user defined length and generates a desired length of bit stream.  ... 
doi:10.5120/16807-6537 fatcat:5tlq2m2mgjam5clul66i2utuvu

General Chairman's Message

1986 MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's  
Acknowledgements We would like to thank Lincoln Wallen for drawing our attention to the connection between tailinvariants and our generalization critic.  ...  Acknowledgements I thank David Greve and David Hardin of the Advanced Technology Center for many suggestions that improved this paper considerably.  ...  These routines access data formats defined by NAIF (such as trajectory data for planets and spacecraft) and routines in analytic geometry (such as the intersection of a ray denoting an observation vector  ... 
doi:10.1109/milcom.1986.4805639 fatcat:yv3yt6hivvg4bjtj5ftdxp7dke

General Chairman's Message

2004 PLANS 2004 Position Location and Navigation Symposium (IEEE Cat No 04CH37556) PLANS-04  
Acknowledgements We would like to thank Lincoln Wallen for drawing our attention to the connection between tailinvariants and our generalization critic.  ...  Acknowledgements I thank David Greve and David Hardin of the Advanced Technology Center for many suggestions that improved this paper considerably.  ...  These routines access data formats defined by NAIF (such as trajectory data for planets and spacecraft) and routines in analytic geometry (such as the intersection of a ray denoting an observation vector  ... 
doi:10.1109/plans.2004.1308961 fatcat:jrv2qudaw5e4fm7vtyfx4clip4

General Chairman's Message

1985 22nd ACM/IEEE Design Automation Conference  
Acknowledgements We would like to thank Lincoln Wallen for drawing our attention to the connection between tailinvariants and our generalization critic.  ...  Acknowledgements I thank David Greve and David Hardin of the Advanced Technology Center for many suggestions that improved this paper considerably.  ...  These routines access data formats defined by NAIF (such as trajectory data for planets and spacecraft) and routines in analytic geometry (such as the intersection of a ray denoting an observation vector  ... 
doi:10.1109/dac.1985.1585898 fatcat:qcddxeqjfrgcnkywt4dlol5s2u

General Chairman's Message

1986 MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's  
Acknowledgements We would like to thank Lincoln Wallen for drawing our attention to the connection between tailinvariants and our generalization critic.  ...  Acknowledgements I thank David Greve and David Hardin of the Advanced Technology Center for many suggestions that improved this paper considerably.  ...  These routines access data formats defined by NAIF (such as trajectory data for planets and spacecraft) and routines in analytic geometry (such as the intersection of a ray denoting an observation vector  ... 
doi:10.1109/milcom.1986.4805724 fatcat:ywopnvuobzd7nfg5vqbicn6wcy

General Chairman's Message

2006 2006 Proceedings of the First Mobile Computing and Wireless Communication International Conference  
Acknowledgements We would like to thank Lincoln Wallen for drawing our attention to the connection between tailinvariants and our generalization critic.  ...  Acknowledgements I thank David Greve and David Hardin of the Advanced Technology Center for many suggestions that improved this paper considerably.  ...  These routines access data formats defined by NAIF (such as trajectory data for planets and spacecraft) and routines in analytic geometry (such as the intersection of a ray denoting an observation vector  ... 
doi:10.1109/mcwc.2006.4375180 fatcat:c4cqrusqb5bcrczqa2fu77zgfu

General Chairman's Message

1986 MILCOM 1986 - IEEE Military Communications Conference: Communications-Computers: Teamed for the 90's  
Acknowledgements We would like to thank Lincoln Wallen for drawing our attention to the connection between tailinvariants and our generalization critic.  ...  Acknowledgements I thank David Greve and David Hardin of the Advanced Technology Center for many suggestions that improved this paper considerably.  ...  These routines access data formats defined by NAIF (such as trajectory data for planets and spacecraft) and routines in analytic geometry (such as the intersection of a ray denoting an observation vector  ... 
doi:10.1109/milcom.1986.4805808 fatcat:45cvhs7md5gupdkd4rckkqy3qm

General Chairman's Message

1983 1983 IEEE Symposium on Security and Privacy  
Acknowledgements We would like to thank Lincoln Wallen for drawing our attention to the connection between tailinvariants and our generalization critic.  ...  Acknowledgements I thank David Greve and David Hardin of the Advanced Technology Center for many suggestions that improved this paper considerably.  ...  These routines access data formats defined by NAIF (such as trajectory data for planets and spacecraft) and routines in analytic geometry (such as the intersection of a ray denoting an observation vector  ... 
doi:10.1109/sp.1983.10000 fatcat:gwmwca6z6vcs7oo44rri25ie4i

General Chairman's Message

1986 23rd ACM/IEEE Design Automation Conference  
Acknowledgements We would like to thank Lincoln Wallen for drawing our attention to the connection between tailinvariants and our generalization critic.  ...  Acknowledgements I thank David Greve and David Hardin of the Advanced Technology Center for many suggestions that improved this paper considerably.  ...  These routines access data formats defined by NAIF (such as trajectory data for planets and spacecraft) and routines in analytic geometry (such as the intersection of a ray denoting an observation vector  ... 
doi:10.1109/dac.1986.1586054 fatcat:4wqbpjk4vzfi5hiqypgttzltjq

Modeling water quality in watersheds: From here to the next generation

B. Fu, J. S. Horsburgh, A. J. Jakeman, C. Gualtieri, T. Arnold, L. Marshall, T. R. Green, N. W. T. Quinn, M. Volk, R. J. Hunt, L. Vezzaro, B. F. W. Croke (+3 others)
2020 Water Resources Research  
In addition, we provide insights into the contemporary challenges in the practices of watershed water quality modeling, including quality control of monitoring data, model parameterization and calibration  ...  We first discuss areas of potential improvement in the representation of freshwater systems pertaining to water quality, including representation of environmental interfaces, in-stream water quality and  ...  the development of supporting tools to aid the setup, evaluation, and assessment of SWAT.  ... 
doi:10.1029/2020wr027721 pmid:33627891 pmcid:PMC7898158 fatcat:pxnzrmgr7vadfbmipaxpzxtzwa
« Previous Showing results 1 — 15 out of 13,520 results