The paper suggests an ontology-based approach for design of security data storage. It analyzes heterogeneous security information for construction of the storage and the statistics …
This chapter considers methods and techniques for analytical processing of cyber security events and information. The approach suggested in the chapter is based on calculating a set …
S Alqahtani - 2018 - spectrum.library.concordia.ca
Over the last decade, a globalization of the software industry has taken place which has facilitated the sharing and reuse of code across existing project boundaries. At the same …
Currently the task of automated security monitoring and responding to security incidents is highly relevant. The authors propose an approach to determine weaknesses of the analyzed …