SIEM implementation for global and distributed environments

I Anastasov, D Davcev - 2014 World Congress on Computer …, 2014 - ieeexplore.ieee.org
Today's computer networks produce a huge amount of security log data. Handling this data
is impossible without using Security Information and Event Management Systems (SIEM) to …

Обзор методологических примитивов для поэтапного построения модели визуализации данных

МВ Коломеец, АА Чечулин… - Информатика и …, 2015 - proceedings.spiiras.nw.ru
Аннотация В статье рассматриваются основные методологические примитивы на
примере поэтапного построения модели визуализации с заранее подготовленными …

Cybersecurity in politics

T Marwala - Artificial intelligence, game theory and mechanism …, 2023 - Springer
This chapter delves into the delicate confluence between cybersecurity and politics, a topic
of rising importance in the digital age. Cybersecurity is no more a standalone concern; it has …

Интеллектуальные сервисы защиты информации в критических инфраструктурах

ИВ Котенко, ИБ Саенко, ЕВ Дойникова, ЕС Новикова… - 2019 - elibrary.ru
В монографии рассмотрены ключевые вопросы, связанные с построением и
функционированием интеллектуальных сервисов защиты информации в критических …

Fast network attack modeling and security evaluation based on attack graphs

I Kotenko, A Chechulin - Journal of Cyber Security and …, 2014 - journals.riverpublishers.com
The paper suggests an approach to network attack modeling and security evaluation which
is realized in advanced Security Information and Event Management (SIEM) systems. It is …

Visual analytics for detecting anomalous activity in mobile money transfer services

E Novikova, I Kotenko - Availability, Reliability, and Security in Information …, 2014 - Springer
Mobile money transfer services (MMTS) are currently being deployed in many markets
across the world and are widely used for domestic and international remittances. However …

Towards augmented proactive cyberthreat intelligence

T Khan, M Alam, A Akhunzada, A Hur, M Asif… - Journal of Parallel and …, 2019 - Elsevier
In cyber crimes, attackers are becoming more inventive with their exploits and use more
sophisticated techniques to bypass the deployed security system. These attacks are targeted …

Cybersecurity incident response: a socio-technical approach

B Al Sabbagh - 2019 - diva-portal.org
This thesis examines the cybersecurity incident response problem using a socio-technical
approach. The motivation of this work is the need to bridge the knowledge and practise gap …

[PDF][PDF] Methodological Primitives for Phased Construction of Data Visualization Models.

M Kolomeec, A Chechulin, IV Kotenko - J. Internet Serv. Inf. Secur., 2015 - researchgate.net
The paper considers common methodological primitives for phased construction of data
visualization models, which will help to create new graphical models of data security …

On the enhancement of data quality in security incident response investigations

G Grispos - 2016 - theses.gla.ac.uk
Security incidents detected by information technology-dependent organisations are
escalating in both scale and complexity. As a result, security incident response has become …