Intrusion detection and big heterogeneous data: a survey

R Zuech, TM Khoshgoftaar, R Wald - Journal of Big Data, 2015 - Springer
Intrusion Detection has been heavily studied in both industry and academia, but
cybersecurity analysts still desire much more alert accuracy and overall threat analysis in …

Reduction of false positives in intrusion detection based on extreme learning machine with situation awareness

DA Burgio - 2020 - search.proquest.com
Protecting computer networks from intrusions is more important than ever for our privacy,
economy, and national security. Seemingly a month does not pass without news of a major …

[PDF][PDF] Cyber-Forces, Interactions, Terrain: An agent-based framework for simulating cyber team performance

G Dobson - 2022 - kilthub.cmu.edu
Over the past decade, militaries all over the world have declared cyberspace a domain of
war. This has led to the professionalization of cyber teams in combat arms. These cyber …

A high-assurance trust model for digital community control system based on internet of things

H Li, J Xing, J Ma - Wuhan University Journal of Natural Sciences, 2016 - Springer
Security issues and Internet of Things (IoT) become indispensable part in digital community
as IoT develops with the pervasive introduction of additional “smart” sensors and devices …

Network Security Systems Log Analysis for Trends and Insights: A Case Study

AK Meena, N Hubballi, Y Singh… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
Network perimeter security appliances like firewalls, intrusion detection systems mediate
communications and log details pertaining to various events. Logs generated by these …