Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center

J Ghadermazi, A Shah, S Jajodia - Digital Threats: Research and …, 2024 - dl.acm.org
Cybersecurity operations centers (CSOCs) protect organizations by monitoring network
traffic and detecting suspicious activities in the form of alerts. The security response team …

Intelligent adaptive optimisation method for enhancement of information security in IoT-enabled environments

SP Singh, Y Alotaibi, G Kumar, SS Rawat - Sustainability, 2022 - mdpi.com
The usage of the Internet increased dramatically during the start of the twenty-first century,
entangling the system with a variety of services, including social media and e-commerce …

PCAM: A data-driven probabilistic cyber-alert management framework

H Chen, A Duncklee, S Jajodia, R Liu… - ACM Transactions on …, 2022 - dl.acm.org
We propose PCAM, a Probabilistic Cyber-Alert Management framework, that enables chief
information security officers to better manage cyber-alerts. Workers in Cyber Security …

Security operations center roles and skills: a comparison of theory and practice

A Reisser, M Vielberth, S Fohringer… - IFIP Annual Conference on …, 2022 - Springer
The increasing number of interfaces between IT assets leads to a broader area prone to
attacks. To address the raising security challenges, enterprises are building up Security …

[HTML][HTML] Blockade-detection-response based security operations dashboard design

CH Han - Computers in Human Behavior Reports, 2021 - Elsevier
Standardization of the security operations dashboard is essential for efficient operation of
security operations center. It must be able to comprehensively express the business …

Predictive Protection of Enterprises from Cyber Attacks

R Liu - 2021 - search.proquest.com
Enterprises are faced with various cyber security threats. In this dissertation, we focus on
three aspects of cyber security threats: 1) cyber vulnerability prediction and patching, 2) …

[PDF][PDF] Міністерство освіти і науки України

РГ СУБ'ЄКТІВ - 2017 - academia.edu
Об'єкт дослідження–процеси управління знаннями в системі інноваційного розвитку
підприємств та установ, а також національної економіки у цілому. Мета роботи …

[引用][C] Effective Data management using heuristic predictive modelling for security applications in games

AKS Yadav, XSA Shiny, M Premalatha… - … Journal of Modeling …, 2025 - World Scientific
Secure and private user data is more important than ever with the explosion of online
gaming platforms and the resulting deluge of user information. Intending to protect gaming …