Threat mitigation system and method

BP Murphy, J Partlow, C O'connor, J Pfeiffer - US Patent 11,374,951, 2022 - Google Patents
A computer-implemented method, computer program product and computing system for:
receiving platform information from a plurality of security-relevant subsystems; processing …

Threat mitigation system and method

BP Murphy, J Partlow, C O'connor, J Pfeiffer - US Patent 10,951,641, 2021 - Google Patents
A computer-implemented method, computer program product and computing system for:
obtaining system-defined consolidated platform information for a computing platform from an …

Threat mitigation system and method

BP Murphy, J Partlow, C O'connor, J Pfeiffer - US Patent 11,323,462, 2022 - Google Patents
A computer-implemented method, computer program product and computing system for:
obtaining one or more artifacts concerning a detected security event; obtaining artifact …

[PDF][PDF] Enhancing Security Information and Event Management to Develop Future-Ready Security Operations Center

S Raju - academia.edu
The threats to the security of networking systems are on the rise. This had led to a continued
need to implement effective monitoring of the events and the activities over the information …

[PDF][PDF] ARQUITETURA CONCEITUAL PARA AVALIAÇÃO DE SEGURANÇA DE SISTEMAS WEB

F de Franco Rosa, M Jino - researchgate.net
Este trabalho apresenta uma reflexão sobre a necessidade de uma arquitetura conceitual
voltada a fazer avaliações de segurança de sistemas web de forma sistemática. A …

[PDF][PDF] ADMINISTRACIÓN ELECTRÓNICA Y TRANSPARENCIA EN LOS AYUNTAMIENTOS DE ESPAÑA. UN ESTUDIO REGIONAL

A Muñoz-Cañavate, AA Saavedra, EAC Miranda - WWW/INTERNET 2016 - academia.edu
Las Administraciones Públicas se han considerado, tradicionalmente, estructuras opacas
en las que, tanto en el ámbito político como en el administrativo, los procesos decisorios no …

[PDF][PDF] EVALUATION OF SECURITY STRENGTH IN DIFFERENT NETWORKS

R Talib, K Hanif, S Ullah - International Journal of Computer Science …, 2017 - academia.edu
Network is the key to connectivity but it is also the key to theft and vulnerability, if it is not
secured properly. The problem that there are many security standards defined for different …

Security assurance assessment for multi-layered and multi-tenant hybrid clouds

A Hudic - 2017 - repositum.tuwien.at
This thesis is based on five publications related to the area of security assurance for hybrid
clouds which were published at conferences or in journals by IEEE and Elsevier. Cloud …

О ЗАДАЧАХ ОБЕСПЕЧЕНИЯ КИБЕРБЕЗОПАСНОСТИ В ИНФРАСТРУКТУРАХ" ЭЛЕКТРОННОГО ГОРОДА" НА ОСНОВЕ МЕТОДОВ ИСКУССТВЕННОГО …

ИВ Котенко, ИБ Саенко - … " Информационные технологии в …, 2014 - elibrary.ru
Рассматриваются проблема обеспечения кибербезопасности в инфраструктурах
«электронного города» с помощью методов искусственного интеллекта и содержание …

[引用][C] The Methodology of the Ways for Increasing the Efficiency of Intrusion Detection Systems

GS Rajaboevich… - International …, 2016 - International Journal of Engineering …