Работа посвящена исследованию подхода к параллельной обработке данных для выполнения задач корреляции событий безопасности на основе технологий больших …
S Khan, S Parkinson - Journal of Information Security and Applications, 2019 - Elsevier
Vulnerability assessment and security configuration of computer systems is heavily dependent on human experts, which are widely attributed as being in short supply. This can …
This chapter considers the methods and techniques for security management of complex heterogeneous systems with an emphasis on event correlation and security assessment …
The paper proposes a novel approach to parallel data processing for solving security event correlation problems based on Big Data technologies. Different security event correlation …
This chapter considers methods and techniques for analytical processing of cyber security events and information. The approach suggested in the chapter is based on calculating a set …
The operational staff in IT is obliged to comply with the requirements for digital business transformation, which should change the traditional IT management techniques. In the spirit …
The current level of information technology development requires increased attention to cyber security. More and more spheres of human activity are influenced by information …