A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Enterprise Search: Tough Stuff
2004
Queue
Enterprise Search: Search
FOCUS
federate
search
security
secure gateways
WWW
repositories
indexes, engines
analytics
browse
alert
recommend
users
classify
profile
index
cluster ...
However, exploiting user interactions to further tune system performance-for example, users rating documents or providing and updating their profilesimplies changes in user behavior. ...
doi:10.1145/988392.988406
fatcat:nn6ifjqepvep3ngpy4ig2cqyai
OVERVIEW OF BEHAVIORAL ANALYTICS SYSTEMS FOR INFORMATION PROTECTION
2022
EurasianUnionofScientists
An analytical review of specific implementations of UEBA technology for solving information security problems has been performed. ...
User and Software Entity Behavior Analysis (UEBA) automatically detects suspicious user activity or other events in the protected information infrastructure that indicate the risk of a threat being implemented ...
User and Entity Behavior Analyticsтехнология анализа поведения пользователей и процессов (сущностей), -нашла применение в информационной безопасности для выявления и предсказания потенциальных угроз (угрозы ...
doi:10.31618/esu.2413-9335.2021.1.93.1547
fatcat:45kkqiy7djarnaagzusow2xqxe
Enabling trustworthy spaces via orchestrated analytical security
2013
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop on - CSIIRW '13
To help them do so, we introduce a conceptual blueprint for the analytics solution. ...
We also present an Orchestrated Analytical Security operational and organizational framework that helps organizations understand how analytical security not only provides monitoring but also creates actionable ...
ACKNOWLEDGEMENTS Some of the work discussed in this paper was done by co-authors Ignatius Chen and Jonté Craighead while they were interns with the Accenture Product and Offering Development Security team ...
doi:10.1145/2459976.2459991
dblp:conf/csiirw/HowesSCC13
fatcat:7hl3mtawpng7lidpmb7jutxmi4
Insider Threat Program Best Practices
2013
2013 46th Hawaii International Conference on System Sciences
Security policies should outline responsibilities and acceptable use for an organization's users. ...
Anytime an organization wants to restrict their users' behavior in the enterprise, it is best to be addressed by preventative controls. ...
doi:10.1109/hicss.2013.279
dblp:conf/hicss/GuidoB13
fatcat:ppubkvdy4zbmfeebr2l3v7lll4
Defence Mechanisms for Public Systems
2018
EAI Endorsed Transactions on Security and Safety
For identifying such attacks, the current article presents Markov-based anomaly detection schemes to profile the behavior of legitimate users in terms of their resource consumption and spot malicious entities ...
In article An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process by Chu Huang, Yi Yang, and Sencun Zhu, authors propose a framework that evaluates security strengths and ...
doi:10.4108/eai.4-1-2018.153524
fatcat:esbkve6labc3rgkkapylmvjaii
Insider attack and real-time data mining of user behavior
2007
IBM Journal of Research and Development
Implementing a system for detecting insider attacks is a technical challenge that also involves business-process changes and decision making that prioritizes the value of enterprise data. ...
In particular, we describe a behavior-anomaly-based system for detecting insider attacks. The system uses peer-group profiling, composite feature modeling, and real-time statistical data mining. ...
Clandestine users typically have knowledge of the enterprise security systems and bypass those systems to access information. ...
doi:10.1147/rd.513.0465
fatcat:3a5wi5nlpzfjrcoxfmwzyyqviq
Big Data Analytics for Cyber Security
2019
Security and Communication Networks
Speci cally, it can discover the process steps of a cyberattack, re ect the current network status, and reveal the behaviors of normal users. ...
: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data" addresses these gaps by complementing the analysis using human security experts. ...
doi:10.1155/2019/4109836
fatcat:67lzxtvobjdendowq4dehvgp2y
The Legal and Security Aspects of ICT and Industry 4.0 Importance for Financial Industry 4.0 Development
2021
EUROPEAN RESEARCH STUDIES JOURNAL
Article indicates one of the development key directions of analytics conducted on Big Data Analytics analytical platforms, i.e., sentiment analysis use to assess the perception and Internet users awareness ...
Originality/Value: This is a complete research for legal and security aspects of ICT and Industry 4.0 importance for Financial Industry 4.0 development. ...
Big Data Analytics and Data Science analytical systems are used by online commerce economic entities. ...
doi:10.35808/ersj/2651
fatcat:7hegmongmzgdnfp7nq77257ine
Digital Ecosystems for Developing Digital Twins of the Earth: The Destination Earth Case
2021
Remote Sensing
DEs require the definition and the governance of a metasystemic level, which is not necessary for a traditional information system. ...
This manuscript discusses the key characteristics of the Digital Ecosystems (DEs) model, which, we argue, is particularly appropriate for connecting and orchestrating the many heterogeneous and autonomous ...
A final thank goes to the reviewers for their comments that helped to improve the manuscript. ...
doi:10.3390/rs13112119
fatcat:qkqvszas3ffj5opx5afzkt2mxe
Operational Security Log Analytics for Enterprise Breach Detection
2016
2016 IEEE Cybersecurity Development (SecDev)
In this paper, we describe a security log analytics framework for proactive breach detection, which we have tested on three applications. ...
Our techniques have been successfully used in operational setting in a large organization and are currently integrated in a real-time behavior analytics product. ...
ACKNOWLEDGEMENTS We would like to thank Ting-Fang Yen and Kaan Onarlioglu for working on the analytics framework in its early days, all members of RSA Laboratories, RSA Office of the CTO and Prof. ...
doi:10.1109/secdev.2016.015
dblp:conf/secdev/LiO16
fatcat:uiuxac3czvfjpj2lblw5wmhsgm
Managing Adaptation Processes of the Enterprise Economic Security System to the Influence of the Customs Regulation Entities
2020
TEM Journal
The main management tool for the enterprise economic security system adaptation to the influence of the customs regulation entities is proposed. The tool is an appropriate adaptation program. ...
A monitoring chart of the enterprise economic security system adaptation to the influence of the customs regulation entities has been developed in the study. ...
entities and to propose certain measures for the adaptation of the enterprise economic security system to their influence. ...
doi:10.18421/tem93-35
fatcat:pyrcdwhlhbamlavmdxx4twgixu
Analysis of the enterprise operating expenses and ways of improvement of their accounting
2021
Economics Entrepreneurship Management
(source documents, journals and ledgers) is essential in order to meet the needs of internal and external users. ...
Properly organized accounting and analytical information on operating expense ensures fair and accurate assessment of the enterprise production process and provide effective management decision-making. ...
The dependence of economic security on qualitatively-formed accounting and analytical support for such purposes is substantiated [8, [15] [16] [17] [18] . ...
doi:10.23939/eem2021.01.043
fatcat:wbohwz4ypveyxfqlrrm3ydmnma
Securing B2B Pervasive Information Sharing between Healthcare Providers: Enabling the Foundation for Evidence based Medicine
2014
Procedia Computer Science
to information and systems within the enterprise. ...
based on flow, signature, behavior, packet capturing techniques in addition to security policies and protection schemes are required to ensure security of the information exchanged as well as other threats ...
Policies and Standards: Generally business entities adopt a set of very enterprise focused security policies and best practices. ...
doi:10.1016/j.procs.2014.08.078
fatcat:7hrjahtopvb33e6e67kpjbwtzm
The Road Toward Behavior-Driven Automation
2021
IEEE wireless communications
And it is not only for network security; all the context and behavior awareness are driven by data. ...
Hard wired, rigid security policies are not effective in hybrid working or learning environments where devices are moving in and out of enterprise networks. ...
And it is not only for network security; all the context and behavior awareness are driven by data. ...
doi:10.1109/mwc.2021.9535458
fatcat:ryopljpnwfafzlxhoxpqki5vvm
Accounting and analytical support for formation of enterprise economic security costs and their controlling process
2020
Economics Entrepreneurship Management
The dependence of economic security on qualitatively-formed accounting and analytical support for such purposes is substantiated. ...
Some forms are proposed to be used in internal management reporting system ("Consolidated statement of enterprise economic security costs accounting" and "Statement of analytical accounting of the enterprise ...
The dependence of economic security on qualitatively-formed accounting and analytical support for such purposes is substantiated. ...
doi:10.23939/eem2020.01.075
fatcat:mboewkjgonf37cn4ie6dng4xpe
« Previous
Showing results 1 — 15 out of 19,964 results