[图书][B] Applied network security monitoring: collection, detection, and analysis

C Sanders, J Smith - 2013 - books.google.com
… As new research and experience broaden our understanding… The time has come again for
civilians to take a more active role in … targets of choice, chosen for a specific reason or goal. …

The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system

CH Han, ST Park, SJ Lee - … Journal of Critical Infrastructure Protection, 2019 - Elsevier
… and sustainable development, the goal being to ensure the security of electricity supply and
… to the security enhancements of cyber-physical power system, the research related to cyber-…

[HTML][HTML] Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices

HU Khan, M Sohail, F Ali, S Nazir, YY Ghadi… - Physical …, 2023 - Elsevier
… ; the objectives of this research are presented in bullets: … The central goal of eliminating
these categories is to reduce … will assist organization and researcher that are actively working in …

Critical Path Prioritization Dashboard for Alert-driven Attack Graphs

SL Díaz, S Pastrana, A Nadeem - arXiv preprint arXiv:2310.13079, 2023 - arxiv.org
… through a user study. Based on the responses of a small set of security practitioners, we find
… stamps, eg, to determine if an attacker targets numerous victims at the same time. Note that …

AIM Triad: A Prioritization Strategy for Public Institutions to Improve Information Security Maturity

J Hochstetter-Diez, M Diéguez-Rebolledo… - Applied Sciences, 2023 - mdpi.com
… achieve this goal is implementing information security maturity … This article proposes a
prioritization strategy for public … [31] This study aims to identify the approaches used to assess …

Identification and prioritization of the challenges faced by vendor organizations in the shape of cyber security: A FUZZY‐AHP‐based systematic approach

AW Khan, S Zaib, MD Alanazi… - Journal of Software …, 2024 - Wiley Online Library
… The goal of this research study was to identify and prioritize the significant cybersecurity
Most prevalent plug-in flaws are found in Adobe and Apple, whereas Chrome and Active X …

[图书][B] The Tao of network security monitoring: beyond intrusion detection

R Bejtlich - 2004 - books.google.com
… The goal of this book is to help you better prepare your … the investigative workload of your
computer security incident … ), every remote serverside exploit must target an active service.25 It …

[HTML][HTML] Using the latin square design model in the prioritzation of network security threats: a quantitative study

R Alexander - Journal of Information Security, 2020 - scirp.org
… and smart phones continue to become targets of cyber-attacks. The … In a scenario where an
attacker is actively attempting to gain … This research investigates the prioritization of computer …

[PDF][PDF] A Quantitative Study: Using the Latin Square Design Model in the Prioritization of Network Security Threats

R Alexander - researchgate.net
… , notebooks, and smart phones continue to become targets of cyber-attacks. The threat of
attack … In a scenario where an attacker is actively attempting to gain access from the internet, a …

[图书][B] Cyber security: A crisis of prioritization

… Information Technology Advisory Committee - 2005 - books.google.com
… than 250 active cyber security or cyber assurance … cyber security researchers and students
at research universities, with a goal of at least doubling the size of the civilian cyber security