A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Recommender systems in cybersecurity

L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …

Security-as-a-service: a literature review

W Wang, S Yongchareon - International Journal of Web Information …, 2020 - emerald.com
Purpose This study aims to identify the level of security from existing work, analyze
categories of security as a service (SECaaS) and classify them into a meaningful set of …

Near-miss situation based visual analysis of SIEM rules for real time network security monitoring

A Majeed, R ur Rasool, F Ahmad, M Alam… - Journal of Ambient …, 2019 - Springer
Security information and event management (SIEM) systems are generally used to monitor
the network for malicious activities. These systems are capable of detecting a wide range of …

A Survey on Security as a Service

W Wang, S Yongchareon - … Conference, Puschino, Russia, October 7-11 …, 2017 - Springer
Abstract Security as a Service (SECaaS) has been demonstrated to be one of the
increasingly popular ways to address security problems in Cloud Computing but still not very …

[图书][B] Exploring strategies that IT leaders use to adopt cloud computing

Z Khan - 2016 - search.proquest.com
Abstract Information Technology (IT) leaders must leverage cloud computing to maintain
competitive advantage. Evidence suggests that IT leaders who have leveraged cloud …

Database security in private database clouds

O Cinar, RH Guncer, A Yazici - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Cloud computing and cloud systems are very popular in today's Information Technology (IT)
and systems and have grown very quickly. Cloud computing helps organizations solve …

[图书][B] IT-Sicherheit in Industrie 4.0: mit Bedrohungen und Risiken umgehen

A Selzer, H Schöning, M Laabs, S Dukanovic, T Henkel - 2020 - books.google.com
The? industry 4.0= concept is intended to create new economic development opportunities
for Germany as a high-tech production location through the digitalization, harmonization and …

Infrastructural Challenges and Good Practices in a Security Operation Center

DA da Silva, JL Costa, JR Almeida - 13th Symposium on …, 2024 - drops.dagstuhl.de
Organizations are facing some challenges in cybersecurity, due to the increasing of cyber
threats, vulnerabilities, insufficient cybersecurity frameworks, and scarcity of proficient …

Security Aspects of SDMN

EM de Oca, W Mallouli - Software Defined Mobile Networks …, 2015 - Wiley Online Library
Security Aspects of SDMN Page 1 Software Defined Mobile Networks (SDMN): Beyond LTE
Network Architecture, First Edition. Edited by Madhusanka Liyanage, Andrei Gurtov, and Mika …