C Liu, A Singhal, D Wijesekera - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies …
Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over …
MS Haque, T Atkison - International Journal of Computer Network …, 2017 - mecs-press.org
The advancement of modern day computing has led to an increase of threats and intrusions. As a result, advanced security measurements and threat analysis models are necessary to …
JS Garrido, D Dold, J Frank - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Machine learning techniques are gaining attention in the context of intrusion detection due to the increasing amounts of data generated by monitoring tools, as well as the …
Public and commercial organizations extensively share cyberthreat intelligence (CTI) to prepare systems to defend against existing and emerging cyberattacks. However, traditional …
An Intrusion Detection System (IDS) to secure computer networks reports indicators for an attack as alerts. However, every attack can result in a multitude of IDS alerts that need to be …
The ever-evolving capabilities of cyber attackers force security administrators to focus on the early identification of emerging threats. Targeted cyber attacks usually consist of several …
S Ejaz, U Noor, Z Rashid - Cybernetics and Information Technologies, 2022 - sciendo.com
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat …
R Jhawar, K Lounis, S Mauw - … Heraklion, Crete, Greece, September 26-27 …, 2016 - Springer
Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business …