Academic literature on the topic 'Cyber alerts'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber alerts.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber alerts"
Chen, Haipeng, Andrew Duncklee, Sushil Jajodia, Rui Liu, Sean Mcnamara, and V. S. Subrahmanian. "PCAM: A Data-driven Probabilistic Cyber-alert Management Framework." ACM Transactions on Internet Technology 22, no. 3 (2022): 1–24. http://dx.doi.org/10.1145/3511101.
Full textAlbasheer, Hashim, Maheyzah Md Siraj, Azath Mubarakali, et al. "Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey." Sensors 22, no. 4 (2022): 1494. http://dx.doi.org/10.3390/s22041494.
Full textAlmseidin, Mohammad, Mouhammad Alkasassbeh, Maen Alzubi, and Jamil Al-Sawwa. "Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation." Cryptography 6, no. 2 (2022): 24. http://dx.doi.org/10.3390/cryptography6020024.
Full textCheng, Xiang, Jiale Zhang, and Bing Chen. "Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation." Sensors 19, no. 18 (2019): 4045. http://dx.doi.org/10.3390/s19184045.
Full textGay, Chris, Barry Horowitz, John Elshaw, Philip Bobko, and Inki Kim. "Operator Suspicion and Decision Responses to Cyber-Attacks on Unmanned Ground Vehicle Systems." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 226–30. http://dx.doi.org/10.1177/1541931213601540.
Full textAngelini, Marco, and Giuseppe Santucci. "Cyber situational awareness: from geographical alerts to high-level management." Journal of Visualization 20, no. 3 (2016): 453–59. http://dx.doi.org/10.1007/s12650-016-0377-3.
Full textYang, Gang, Chaojing Tang, and Xingtong Liu. "DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective." Symmetry 14, no. 10 (2022): 2138. http://dx.doi.org/10.3390/sym14102138.
Full textPriyawati, Diah, Siti Rokhmah, and Ihsan Cahyo Utomo. "Website Vulnerability Testing and Analysis of Website Application Using OWASP." International Journal of Computer and Information System (IJCIS) 3, no. 3 (2022): 142–47. http://dx.doi.org/10.29040/ijcis.v3i3.90.
Full textSahu, Abhijeet, and Katherine Davis. "Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach." Sensors 22, no. 6 (2022): 2100. http://dx.doi.org/10.3390/s22062100.
Full textKhosravi, Mehran, and Behrouz Tork Ladani. "Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection." IEEE Access 8 (2020): 162642–56. http://dx.doi.org/10.1109/access.2020.3021499.
Full textDissertations / Theses on the topic "Cyber alerts"
Clarke, Karla A. "Novel Alert Visualization: The Development of a Visual Analytics Prototype for Mitigation of Malicious Insider Cyber Threats." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1049.
Full textAfzaliSeresht, Neda. "Explainable Intelligence for Comprehensive Interpretation of Cybersecurity Data in Incident Management." Thesis, 2022. https://vuir.vu.edu.au/44414/.
Full textMargarido, Daniel Ribeiro. "Waldo, the virtual & intelligent cyber analyst." Master's thesis, 2017. http://hdl.handle.net/10400.26/25336.
Full textWu, Chia-Wei, and 吳嘉偉. "Cyber Security Vulnerabilities Alert System Based on Information from Twitter and CVE." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394022%22.&searchmode=basic.
Full textGhafir, Ibrahim, M. Hammoudeh, V. Prenosil, et al. "Detection of advanced persistent threat using machine-learning correlation analysis." 2018. http://hdl.handle.net/10454/17614.
Full textBooks on the topic "Cyber alerts"
Streeter, Michael, and Peter Warren. Cyber Alert: How the World Is Under Attack from a New Form of Crime. Vision, 2005.
Find full textBook chapters on the topic "Cyber alerts"
Burkart, Nadia, Maximilian Franz, and Marco F. Huber. "Explanation Framework for Intrusion Detection." In Machine Learning for Cyber Physical Systems. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-62746-4_9.
Full textWurzenberger, Markus, Max Landauer, Agron Bajraktari, and Florian Skopik. "Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_7.
Full textCheng, Xiang, Jiale Zhang, and Bing Chen. "Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0758-8_10.
Full textBahaa-Eldin, Ayman M. "A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and Events." In Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43616-5_1.
Full textDunstatter, Noah, Alireza Tahsini, Mina Guirguis, and Jelena Tešić. "Solving Cyber Alert Allocation Markov Games with Deep Reinforcement Learning." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32430-8_11.
Full textLeeuw, H. B. M. "Using Big Data to Study Digital Piracy and the Copyright Alert System 1." In Cyber Society, Big Data, and Evaluation. Routledge, 2017. http://dx.doi.org/10.4324/9780203793909-6.
Full textGanesan, Rajesh, Ankit Shah, Sushil Jajodia, and Hasan Cam. "Optimizing Alert Data Management Processes at a Cyber Security Operations Center." In Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6_9.
Full textGanesan, Rajesh, and Ankit Shah. "A Strategy for Effective Alert Analysis at a Cyber Security Operations Center." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04834-1_11.
Full textFunke, Gregory, Gregory Dye, Brett Borghetti, et al. "Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41932-9_30.
Full textRiebe, Thea, Tristan Wirth, Markus Bayer, et al. "CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data." In Information and Communications Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86890-1_24.
Full textConference papers on the topic "Cyber alerts"
Wu, Mingtao, and Young B. Moon. "Intrusion Detection of Cyber-Physical Attacks in Manufacturing Systems: A Review." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10135.
Full textSchlenker, Aaron, Haifeng Xu, Mina Guirguis, et al. "Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/54.
Full textBrosset, David, Camille Cavelier, Benjamin Coste, Yvon Kermarrec, Joffrey Lartigaud, and Pedro Merino Laso. "Cr@ck3n: A cyber alerts visualization object." In 2017 International Conference on Cyber-Situational Awareness, Data Analytics and Assessment (Cyber SA). IEEE, 2017. http://dx.doi.org/10.1109/cybersa.2017.8073401.
Full textDunstatter, Noah, Mina Guirguis, and Alireza Tahsini. "Allocating Security Analysts to Cyber Alerts Using Markov Games." In 2018 National Cyber Summit (NCS). IEEE, 2018. http://dx.doi.org/10.1109/ncs.2018.00008.
Full textCappers, Bram C. M., and Jarke J. van Wijk. "Understanding the context of network traffic alerts." In 2016 IEEE Symposium on Visualization for Cyber Security (VizSec). IEEE, 2016. http://dx.doi.org/10.1109/vizsec.2016.7739579.
Full textKidmose, Egon, Matija Stevanovic, and Jens Myrup Pedersen. "Correlating intrusion detection alerts on bot malware infections using neural network." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 2016. http://dx.doi.org/10.1109/cybersecpods.2016.7502344.
Full textAfzaliSeresht, Neda, Yuan Miao, Qing Liu, Assefa Teshome, and Wenjie Ye. "Investigating cyber alerts with graph-based analytics and narrative visualization." In 2020 24th International Conference Information Visualisation (IV). IEEE, 2020. http://dx.doi.org/10.1109/iv51561.2020.00090.
Full textVaarandi, Risto. "A Stream Clustering Algorithm for Classifying Network IDS Alerts." In 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2021. http://dx.doi.org/10.1109/csr51186.2021.9527926.
Full textMoskal, Stephen, Shanchieh Jay Yang, and Michael E. Kuhl. "Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts." In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2018. http://dx.doi.org/10.1109/isi.2018.8587402.
Full textCam, Hasan, and Pierre Mouallem. "Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks." In 2014 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2014. http://dx.doi.org/10.1109/iccnc.2014.6785305.
Full text