A survey on threat hunting in enterprise networks
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Recommender systems in cybersecurity
L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …
Security-as-a-service: a literature review
W Wang, S Yongchareon - International Journal of Web Information …, 2020 - emerald.com
Purpose This study aims to identify the level of security from existing work, analyze
categories of security as a service (SECaaS) and classify them into a meaningful set of …
categories of security as a service (SECaaS) and classify them into a meaningful set of …
Near-miss situation based visual analysis of SIEM rules for real time network security monitoring
A Majeed, R ur Rasool, F Ahmad, M Alam… - Journal of Ambient …, 2019 - Springer
Security information and event management (SIEM) systems are generally used to monitor
the network for malicious activities. These systems are capable of detecting a wide range of …
the network for malicious activities. These systems are capable of detecting a wide range of …
A Survey on Security as a Service
W Wang, S Yongchareon - … Conference, Puschino, Russia, October 7-11 …, 2017 - Springer
Abstract Security as a Service (SECaaS) has been demonstrated to be one of the
increasingly popular ways to address security problems in Cloud Computing but still not very …
increasingly popular ways to address security problems in Cloud Computing but still not very …
[图书][B] Exploring strategies that IT leaders use to adopt cloud computing
Z Khan - 2016 - search.proquest.com
Abstract Information Technology (IT) leaders must leverage cloud computing to maintain
competitive advantage. Evidence suggests that IT leaders who have leveraged cloud …
competitive advantage. Evidence suggests that IT leaders who have leveraged cloud …
Database security in private database clouds
O Cinar, RH Guncer, A Yazici - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Cloud computing and cloud systems are very popular in today's Information Technology (IT)
and systems and have grown very quickly. Cloud computing helps organizations solve …
and systems and have grown very quickly. Cloud computing helps organizations solve …
[图书][B] IT-Sicherheit in Industrie 4.0: mit Bedrohungen und Risiken umgehen
A Selzer, H Schöning, M Laabs, S Dukanovic, T Henkel - 2020 - books.google.com
The? industry 4.0= concept is intended to create new economic development opportunities
for Germany as a high-tech production location through the digitalization, harmonization and …
for Germany as a high-tech production location through the digitalization, harmonization and …
Infrastructural Challenges and Good Practices in a Security Operation Center
DA da Silva, JL Costa, JR Almeida - 13th Symposium on …, 2024 - drops.dagstuhl.de
Organizations are facing some challenges in cybersecurity, due to the increasing of cyber
threats, vulnerabilities, insufficient cybersecurity frameworks, and scarcity of proficient …
threats, vulnerabilities, insufficient cybersecurity frameworks, and scarcity of proficient …
Security Aspects of SDMN
EM de Oca, W Mallouli - Software Defined Mobile Networks …, 2015 - Wiley Online Library
Security Aspects of SDMN Page 1 Software Defined Mobile Networks (SDMN): Beyond LTE
Network Architecture, First Edition. Edited by Madhusanka Liyanage, Andrei Gurtov, and Mika …
Network Architecture, First Edition. Edited by Madhusanka Liyanage, Andrei Gurtov, and Mika …