Filters








19,964 Hits in 3.5 sec

Enterprise Search: Tough Stuff

Rajat Mukherjee, Jianchang Mao
2004 Queue  
Enterprise Search: Search FOCUS federate search security secure gateways WWW repositories indexes, engines analytics browse alert recommend users classify profile index cluster  ...  However, exploiting user interactions to further tune system performance-for example, users rating documents or providing and updating their profilesimplies changes in user behavior.  ... 
doi:10.1145/988392.988406 fatcat:nn6ifjqepvep3ngpy4ig2cqyai

OVERVIEW OF BEHAVIORAL ANALYTICS SYSTEMS FOR INFORMATION PROTECTION

N. Mironova, L. Chupeeva
2022 EurasianUnionofScientists  
An analytical review of specific implementations of UEBA technology for solving information security problems has been performed.  ...  User and Software Entity Behavior Analysis (UEBA) automatically detects suspicious user activity or other events in the protected information infrastructure that indicate the risk of a threat being implemented  ...  User and Entity Behavior Analyticsтехнология анализа поведения пользователей и процессов (сущностей), -нашла применение в информационной безопасности для выявления и предсказания потенциальных угроз (угрозы  ... 
doi:10.31618/esu.2413-9335.2021.1.93.1547 fatcat:45kkqiy7djarnaagzusow2xqxe

Enabling trustworthy spaces via orchestrated analytical security

Joshua Howes, James Solderitsch, Ignatius Chen, Jonté Craighead
2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop on - CSIIRW '13  
To help them do so, we introduce a conceptual blueprint for the analytics solution.  ...  We also present an Orchestrated Analytical Security operational and organizational framework that helps organizations understand how analytical security not only provides monitoring but also creates actionable  ...  ACKNOWLEDGEMENTS Some of the work discussed in this paper was done by co-authors Ignatius Chen and Jonté Craighead while they were interns with the Accenture Product and Offering Development Security team  ... 
doi:10.1145/2459976.2459991 dblp:conf/csiirw/HowesSCC13 fatcat:7hl3mtawpng7lidpmb7jutxmi4

Insider Threat Program Best Practices

Mark D. Guido, Marc W. Brooks
2013 2013 46th Hawaii International Conference on System Sciences  
Security policies should outline responsibilities and acceptable use for an organization's users.  ...  Anytime an organization wants to restrict their users' behavior in the enterprise, it is best to be addressed by preventative controls.  ... 
doi:10.1109/hicss.2013.279 dblp:conf/hicss/GuidoB13 fatcat:ppubkvdy4zbmfeebr2l3v7lll4

Defence Mechanisms for Public Systems

Sencun Zhu, Kevin Jones, Leandros Maglaras
2018 EAI Endorsed Transactions on Security and Safety  
For identifying such attacks, the current article presents Markov-based anomaly detection schemes to profile the behavior of legitimate users in terms of their resource consumption and spot malicious entities  ...  In article An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process by Chu Huang, Yi Yang, and Sencun Zhu, authors propose a framework that evaluates security strengths and  ... 
doi:10.4108/eai.4-1-2018.153524 fatcat:esbkve6labc3rgkkapylmvjaii

Insider attack and real-time data mining of user behavior

G. F. Anderson, D. A. Selby, M. Ramsey
2007 IBM Journal of Research and Development  
Implementing a system for detecting insider attacks is a technical challenge that also involves business-process changes and decision making that prioritizes the value of enterprise data.  ...  In particular, we describe a behavior-anomaly-based system for detecting insider attacks. The system uses peer-group profiling, composite feature modeling, and real-time statistical data mining.  ...  Clandestine users typically have knowledge of the enterprise security systems and bypass those systems to access information.  ... 
doi:10.1147/rd.513.0465 fatcat:3a5wi5nlpzfjrcoxfmwzyyqviq

Big Data Analytics for Cyber Security

Pelin Angin, Bharat Bhargava, Rohit Ranchal
2019 Security and Communication Networks  
Speci cally, it can discover the process steps of a cyberattack, re ect the current network status, and reveal the behaviors of normal users.  ...  : A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data" addresses these gaps by complementing the analysis using human security experts.  ... 
doi:10.1155/2019/4109836 fatcat:67lzxtvobjdendowq4dehvgp2y

The Legal and Security Aspects of ICT and Industry 4.0 Importance for Financial Industry 4.0 Development

Weronika Jakubczak, Anna Golebiowska, Dariusz Prokopowicz
2021 EUROPEAN RESEARCH STUDIES JOURNAL  
Article indicates one of the development key directions of analytics conducted on Big Data Analytics analytical platforms, i.e., sentiment analysis use to assess the perception and Internet users awareness  ...  Originality/Value: This is a complete research for legal and security aspects of ICT and Industry 4.0 importance for Financial Industry 4.0 development.  ...  Big Data Analytics and Data Science analytical systems are used by online commerce economic entities.  ... 
doi:10.35808/ersj/2651 fatcat:7hegmongmzgdnfp7nq77257ine

Digital Ecosystems for Developing Digital Twins of the Earth: The Destination Earth Case

Stefano Nativi, Paolo Mazzetti, Max Craglia
2021 Remote Sensing  
DEs require the definition and the governance of a metasystemic level, which is not necessary for a traditional information system.  ...  This manuscript discusses the key characteristics of the Digital Ecosystems (DEs) model, which, we argue, is particularly appropriate for connecting and orchestrating the many heterogeneous and autonomous  ...  A final thank goes to the reviewers for their comments that helped to improve the manuscript.  ... 
doi:10.3390/rs13112119 fatcat:qkqvszas3ffj5opx5afzkt2mxe

Operational Security Log Analytics for Enterprise Breach Detection

Zhou Li, Alina Oprea
2016 2016 IEEE Cybersecurity Development (SecDev)  
In this paper, we describe a security log analytics framework for proactive breach detection, which we have tested on three applications.  ...  Our techniques have been successfully used in operational setting in a large organization and are currently integrated in a real-time behavior analytics product.  ...  ACKNOWLEDGEMENTS We would like to thank Ting-Fang Yen and Kaan Onarlioglu for working on the analytics framework in its early days, all members of RSA Laboratories, RSA Office of the CTO and Prof.  ... 
doi:10.1109/secdev.2016.015 dblp:conf/secdev/LiO16 fatcat:uiuxac3czvfjpj2lblw5wmhsgm

Managing Adaptation Processes of the Enterprise Economic Security System to the Influence of the Customs Regulation Entities

Yevhenii Rudnichenko, Serhii Matiukh, Nataliia Shuprudko, Raisa Kvasnytska, Inna Dotsenko, Anatolii Yaroslavskyi
2020 TEM Journal  
The main management tool for the enterprise economic security system adaptation to the influence of the customs regulation entities is proposed. The tool is an appropriate adaptation program.  ...  A monitoring chart of the enterprise economic security system adaptation to the influence of the customs regulation entities has been developed in the study.  ...  entities and to propose certain measures for the adaptation of the enterprise economic security system to their influence.  ... 
doi:10.18421/tem93-35 fatcat:pyrcdwhlhbamlavmdxx4twgixu

Analysis of the enterprise operating expenses and ways of improvement of their accounting

O. Grytsay, Lviv Polytechnic National University, M. Pankiv, D. Kut, G. Wojtan, Lviv Polytechnic National University, Lviv Polytechnic National University, Maria Curie-Sklodowska University
2021 Economics Entrepreneurship Management  
(source documents, journals and ledgers) is essential in order to meet the needs of internal and external users.  ...  Properly organized accounting and analytical information on operating expense ensures fair and accurate assessment of the enterprise production process and provide effective management decision-making.  ...  The dependence of economic security on qualitatively-formed accounting and analytical support for such purposes is substantiated [8, [15] [16] [17] [18] .  ... 
doi:10.23939/eem2021.01.043 fatcat:wbohwz4ypveyxfqlrrm3ydmnma

Securing B2B Pervasive Information Sharing between Healthcare Providers: Enabling the Foundation for Evidence based Medicine

Rajesh Vargheese, Prashant Prabhudesai
2014 Procedia Computer Science  
to information and systems within the enterprise.  ...  based on flow, signature, behavior, packet capturing techniques in addition to security policies and protection schemes are required to ensure security of the information exchanged as well as other threats  ...  Policies and Standards: Generally business entities adopt a set of very enterprise focused security policies and best practices.  ... 
doi:10.1016/j.procs.2014.08.078 fatcat:7hrjahtopvb33e6e67kpjbwtzm

The Road Toward Behavior-Driven Automation

Andre Fuetsch
2021 IEEE wireless communications  
And it is not only for network security; all the context and behavior awareness are driven by data.  ...  Hard wired, rigid security policies are not effective in hybrid working or learning environments where devices are moving in and out of enterprise networks.  ...  And it is not only for network security; all the context and behavior awareness are driven by data.  ... 
doi:10.1109/mwc.2021.9535458 fatcat:ryopljpnwfafzlxhoxpqki5vvm

Accounting and analytical support for formation of enterprise economic security costs and their controlling process

O Grytsay, Lviv Politechnic National University, M Havran
2020 Economics Entrepreneurship Management  
The dependence of economic security on qualitatively-formed accounting and analytical support for such purposes is substantiated.  ...  Some forms are proposed to be used in internal management reporting system ("Consolidated statement of enterprise economic security costs accounting" and "Statement of analytical accounting of the enterprise  ...  The dependence of economic security on qualitatively-formed accounting and analytical support for such purposes is substantiated.  ... 
doi:10.23939/eem2020.01.075 fatcat:mboewkjgonf37cn4ie6dng4xpe
« Previous Showing results 1 — 15 out of 19,964 results