A survey on intrusion detection systems for fog and cloud computing

V Chang, L Golightly, P Modesti, QA Xu, LMT Doan… - Future Internet, 2022 - mdpi.com
The rapid advancement of internet technologies has dramatically increased the number of
connected devices. This has created a huge attack surface that requires the deployment of …

[HTML][HTML] Cost benefits of using machine learning features in NIDS for cyber security in UK small medium enterprises (SME)

N Rawindaran, A Jayal, E Prakash, C Hewage - Future Internet, 2021 - mdpi.com
Cyber security has made an impact and has challenged Small and Medium Enterprises
(SMEs) in their approaches towards how they protect and secure data. With an increase in …

Holistic web application security visualization for multi-project and multi-phase dynamic application security test results

FÖ Sönmez, BG Kiliç - IEEE Access, 2021 - ieeexplore.ieee.org
As the number of web applications and the corresponding number and sophistication of the
threats increases, creating new tools that are efficient and accessible becomes essential …

A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform

NS Chahal, P Bali, PK Khosla - Computers & Security, 2022 - Elsevier
The increasing number of attacks leads to a growing research and development interest in
cybersecurity systems. As a response to the increasingly distributed nature of attacks, many …

Impact of cyber security awareness in small, medium enterprises (SMEs) in Wales

N Rawindaran - 2023 - figshare.cardiffmet.ac.uk
The rapid growth of digital technologies and how data is managed has transformed the way
businesses operate, presenting countless opportunities and challenges. Small and Medium …

[PDF][PDF] Botnet intrusion detection: A modern architecture to defend a virtual private cloud.

R Brison, H Wimmer, CM Rebman Jr - Issues in Information Systems, 2022 - iacis.org
In recent years, there has been a considerable rise in cyberattacks on networks. Botnets are
increasingly becoming one of the most widely used methods for leveraging attacks …

Discerning Challenges of Security Information and Event Management (SIEM) Systems in Large Organizations

P Shirazi, A Padyab - International Symposium on Human Aspects of …, 2024 - Springer
Abstract Security Information and Event Management (SIEM) systems are essential for
security experts in various daily tasks such as monitoring, anomaly detection, forensics …

Proyecto de gestión de redes en BioCen

IR González, MP Casanova, AB Peña… - Innovation and …, 2021 - revistas.ulasalle.edu.pe
BioCen es una institución científica integrada por varias unidades productivas que se
dedican a diferentes líneas en el universo biotecnológico y farmacéutico cubano. Para …

Security visualization infrastructures, techniques, and methodologies for improved enterprise security

FFÖ Sönmez - 2019 - search.proquest.com
This thesis focuses on providing designs to allow monitoring of the security status of
enterprises at the organization level. The audience of this research is all enterprise level IT …