Academic literature on the topic 'Cybersecurity dashboard'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity dashboard.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity dashboard"

1

Shaikh, Arafat Tabrez. "An Innovative Approach to Job Placement through a Training and Placement Portal." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46264.

Full text
Abstract:
Abstract - This research focuses on the development of a Training and Placement Portal, a web-based application designed to streamline the process of connecting job seekers and employers. The portal allows users to create profiles, upload resumes, search for available job opportunities, and apply for relevant positions. Employers can post job vacancies, manage applicant information, and send interview invitations. The system is divided into key modules such as Admin, User, Company, Vacancy, and Dashboard, with each module performing distinct tasks to ensure smooth operation. The research emplo
APA, Harvard, Vancouver, ISO, and other styles
2

S., Yaswanthraj, Adhithyan M., Kowshik T., Logha Surya N., and Mihaash Dharan M. "URLs Threat Identification Dashboard." Research and Reviews: Advancement in Cyber Security 2, no. 2 (2025): 41–50. https://doi.org/10.5281/zenodo.15573303.

Full text
Abstract:
<em>The growth in malware-hosting and phishing sites represents a fundamental threat to cybersecurity in all industries. This document introduces an in-time URLs Threat Identification Dashboard that scan s, aggregates, and visualizes malicious URLs based on </em><em>Abuse.ch (URL Haus) and AbuseIPDB data. The system periodically retrieves and processes threat feeds, stores them in a MariaDB database, and presents them on a Flask-built web interface. Developed with proactive defense in mind, the system updates information in real time, and it's designed for integration with future versions of f
APA, Harvard, Vancouver, ISO, and other styles
3

Clarke, Karla, Yair Levy, Laurie Dringus, and Shonda Brown. "How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders." Online Journal of Applied Knowledge Management 7, no. 1 (2019): 40–52. http://dx.doi.org/10.36965/ojakm.2019.7(1)40-52.

Full text
Abstract:
Insider threat mitigation is a growing challenge within organizations. The development of a novel alert visualization dashboard for the identification of potentially malicious cyber insider threats was identified as necessary to alleviate this challenge. This research developed a cyber insider threat dashboard visualization prototype for detecting potentially malicious cyber insider activities QUICK.v™. This study utilized Subject Matter Experts (SMEs) by applying the Delphi Method to identify the most critical cyber visualization variables and ranking. This paper contains the detailed results
APA, Harvard, Vancouver, ISO, and other styles
4

Saeed, Saqib, Sarah A. Suayyid, Manal S. Al-Ghamdi, Hayfa Al-Muhaisen, and Abdullah M. Almuhaideb. "A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience." Sensors 23, no. 16 (2023): 7273. http://dx.doi.org/10.3390/s23167273.

Full text
Abstract:
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and disseminating information about potential risks and opportunities inside the cyber domain. This research investigates how companies can employ CTI to improve their precautionary measures against security breaches. The study follows a systematic review methodology, including selecting primary studies based on specific criteria and quality valuation o
APA, Harvard, Vancouver, ISO, and other styles
5

Espinha Gasiba, Tiago, Ulrike Lechner, and Maria Pinto-Albuquerque. "Cybersecurity Challenges in Industry: Measuring the Challenge Solve Time to Inform Future Challenges." Information 11, no. 11 (2020): 533. http://dx.doi.org/10.3390/info11110533.

Full text
Abstract:
Cybersecurity vulnerabilities in industrial control systems have been steadily increasing over the last few years. One possible way to address this issue is through raising the awareness (through education) of software developers, with the intent to increase software quality and reduce the number of vulnerabilities. CyberSecurity Challenges (CSCs) are a novel serious game genre that aims to raise industrial software developers’ awareness of secure coding, secure coding guidelines, and secure coding best practices. An important industry-specific requirement to consider in designing these kinds
APA, Harvard, Vancouver, ISO, and other styles
6

Balogun, Adebayo Yusuf. "Strengthening Compliance with Data Privacy Regulations in U.S. Healthcare Cybersecurity." Asian Journal of Research in Computer Science 18, no. 1 (2025): 154–73. https://doi.org/10.9734/ajrcos/2025/v18i1555.

Full text
Abstract:
This study evaluates the state of data privacy and cybersecurity compliance within the U.S. healthcare sector, leveraging data from the U.S. Department of Health &amp; Human Services Breach Portal, Verizon Data Breach Investigations Report, and the Health IT Dashboard. A quantitative methodology comprising descriptive statistical analysis, K-means clustering, and multivariate regression was employed to examine healthcare data breaches, categorize cybersecurity threats, and identify compliance challenges. Findings revealed a persistent increase in breaches, with hacking/IT incidents comprising
APA, Harvard, Vancouver, ISO, and other styles
7

Subha K, Benitlin. "AI-Driven Cybersecurity Model for Real-Time Threat Detection and Prevention." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47712.

Full text
Abstract:
Abstract - As cyber threats become more dynamic and sophisticated, traditional intrusion detection systems often fall short in identifying emerging attacks in real-time. This project introduces a hybrid AI-driven cybersecurity model that combines supervised machine learning and deep reinforcement learning for adaptive, explainable, and real-time threat detection and prevention. It uses an XGBoost classifier trained on the UNSW-NB15 dataset to predict initial threats and a Deep Q-Network (DQN) agent, built with PyTorch, to make optimal security decisions based on evolving threats. The DQN inter
APA, Harvard, Vancouver, ISO, and other styles
8

S, KAVIYA. "REAL-TIME FIREWALL EVENT ALERT SYSTEM FOR NETWORK PROTECTION." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02862.

Full text
Abstract:
The proposed system addresses the limitations of traditional firewalls by introducing real-time alert functionality using Django and Python. It monitors firewall logs to detect suspicious activities like brute-force login attempts, port scans, and large data transfers. Alerts are generated immediately and sent via email, ensuring quick response. The system includes a web dashboard for admin visibility and uses SQLite for lightweight storage. It is affordable, scalable, and suitable for small organizations and educational institutions. By automating detection and alerts, it minimizes manual wor
APA, Harvard, Vancouver, ISO, and other styles
9

Ogunmolu, Akinde Michael. "Leveraging Generative AI and Behavioral Biometrics to Strengthen Zero Trust Cybersecurity Architectures in Healthcare Systems." Journal of Engineering Research and Reports 27, no. 5 (2025): 194–213. https://doi.org/10.9734/jerr/2025/v27i51502.

Full text
Abstract:
This study investigates the integration of Generative Artificial Intelligence (AI) and Behavioral Biometrics within Zero Trust cybersecurity frameworks tailored for healthcare systems. Drawing on public datasets—including MITRE ATT&amp;CK for Enterprise, UNSW Behavioral Biometrics, and the HHS HC3 Healthcare Cybersecurity Dashboard—the study employs a quantitative design featuring Two-Sample T-Tests, ROC-AUC analysis, and Exploratory Factor Analysis (EFA). Findings indicate a marked improvement in threat detection rates, rising from 65.21% to 82.06% following Generative AI deployment. Addition
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmad, Siti Arpah, Muhammad Al’Imran Mohd Khairuddin, Nor Shahniza Kamal Bashah, and Nurul Aishah Ab Raman. "An integrated framework for data breach on the dark web in brand monitoring data hunting." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 3 (2025): 3162. https://doi.org/10.11591/ijece.v15i3.pp3162-3170.

Full text
Abstract:
In today's digital landscape, data breaches pose a substantial threat, with the dark web serving as a prevalent platform for malevolent actors to perpetrate such incidents. Currently, security analysts use various tools to solve the problem, which is very time-consuming. This paper introduces a novel framework that integrates data breach monitoring within the dark web, focusing on brand monitoring and data hunting. The framework starts from the scraping process and continues with the utilisation of the Splunk dashboard. The dashboard provides an exhaustive overview of data breaches related to
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity dashboard"

1

Shirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.

Full text
Abstract:
Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. One of the challenges for different security actors, such as securityadmins, cybersecurity analysis, and network technicians, is how to utilize this amount of data inorder to reach meaningful insights, so they can be used further in diagnosis, validation, forensicand decision-making purposes. In order
APA, Harvard, Vancouver, ISO, and other styles
2

Elisa, Francesco Lupo. "A Situational Awareness Dashboard for a Security Operations Center." Master's thesis, 2021. http://hdl.handle.net/10362/133360.

Full text
Abstract:
As a result of this dissertation, a solution was developed which would provide visibility into an institution’s security posture and its exposure to risk. Achieving this required the development of a Situational Awareness Dashboard in a cybersecurity context. This Dashboard provides a unified point of view where workers ranging from analysts to members of the executive board can consult and interact with a visual interface that aggregates a set of strategically picked metrics. These metrics provide insight regarding two main topics, the performance and risk of the organization’s Security
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cybersecurity dashboard"

1

Wurzenberger, Markus, Max Landauer, Agron Bajraktari, and Florian Skopik. "Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_7.

Full text
Abstract:
AbstractIntrusion Detection Systems (IDSs) monitor all kinds of IT infrastructures to automatically detect malicious activities related to cyber attacks. Unfortunately, especially anomaly-based IDS are known to produce large numbers of alerts, including false positives, that often become overwhelming for manual analysis. However, due to a fast changing threat landscape, quickly evolving attack techniques, and ever growing number of vulnerabilities, novel anomaly detection systems that enable detection of unknown attacks are indispensable. Therefore, to reduce the number of alerts that have to
APA, Harvard, Vancouver, ISO, and other styles
2

Polst, Svenja, Patricia Kelbert, and Denis Feth. "Company Privacy Dashboards: Employee Needs and Requirements." In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22351-9_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ouatiq, Amina, Bouchaib Riyami, Khalifa Mansouri, and Mohammed Qbadou. "The Preferences and Expectation of Moroccan Teachers from Learning Analytics Dashboards in a Blended Learning Environment: Empirical Study." In Advances in Information, Communication and Cybersecurity. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91738-8_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

N. Alasaad, Ameer A., Nor Azlina Abd Rahman, and Yusnita Yusof. "Intrusion Detection System for the Internet of Medical Things (IoMT)." In Emerging Technologies for Digital Infrastructure Development. BENTHAM SCIENCE PUBLISHERS, 2023. http://dx.doi.org/10.2174/9789815080957123010010.

Full text
Abstract:
In this paper, the authors proposed the design of an Intrusion Detection System (IDS) that can be used in the healthcare sector to increase cybersecurity. This sector is facing high cyber threats. Similar IDS systems will be reviewed in the following pages, followed by the justifications of why the authors decided to design the IDS to be Signature-based. The experimental results showed that the developed IDS could successfully capture the network traffic, record the logs and show an informative alarm screen with a few other options within the dashboard to assist the user in handling the situat
APA, Harvard, Vancouver, ISO, and other styles
5

Omar, Khalil, Jamal Zraqou, Wesam Alkhadour, and Jorge Marx Gómez. "Evolving Sentinels." In Advances in Computational Intelligence and Robotics. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-0954-5.ch009.

Full text
Abstract:
This chapter introduces the adaptive defense intelligence framework (ADIF), short for the Adaptive Defense Intelligence Framework, a radically new initiative in the field of autonomous cybersecurity systems. ADIF overcomes glaring limitations present in existing security solutions through innovation in four different major spheres: hierarchical reinforcement learning architecture, a contextual analysis engine that drastically reduces false positives, federated knowledge distribution that maintains privacy, and a self-verification feedback loop. Financial, healthcare, and manufacturing operatio
APA, Harvard, Vancouver, ISO, and other styles
6

Voloshin, Misha. "Predictive Network Defense." In Advances in Data Mining and Database Management. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5063-3.ch007.

Full text
Abstract:
Maintaining electronic devices in today's networked world is not for the faint of heart. The modern network administrator is tasked not only with keeping machines running but also with standing a constant and unerring vigil against cyberattack. A skilled admin learns to identify telltale signs that the network is in trouble, and to quickly evict intruders, repair damage, and reinforce the network's fortifications. No software today can replicate a trained admin's experience and talent. However, just as viruses and rootkits grow progressively more sophisticated with each passing year(Parikka, 2
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity dashboard"

1

Tiong Tan, Kelwin Seen, Angela Siew Hoong Lee, and Chin Teck Min. "Studying The Perception of Using Visualization Dashboard to Measure Cybersecurity Maturity Stage." In 2021 7th International Conference on Research and Innovation in Information Systems (ICRIIS). IEEE, 2021. http://dx.doi.org/10.1109/icriis53035.2021.9617069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Audouin, Grégoire, Rémi Lannes, Gildas Collin, et al. "First Proof of Concept for an Integrated Robot Supervision System." In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211039-ms.

Full text
Abstract:
Abstract TotalEnergies’ use of robotics on remote or offshore sites is considered with the objective of enabling unmanned operation for long periods and as the next frontier for increased personnel safety, industry attractiveness for young talents and further OPEX and CAPEX reduction. TotalEnergies performed several IT/OT system architecture evolutions and developed a specific Robot Supervision System (RSS) equivalent to a fleet management system to help and consolidate know-how in the deployments of specific mobile ground robots. As the first autonomous and explosion-proof inspection ground r
APA, Harvard, Vancouver, ISO, and other styles
3

Lalena, Dominick J., and David M. Feinauer. "Applying Display Design Principles to Organizational Cybersecurity to Create Effective Visualizations and Dashboards." In SoutheastCon 2023. IEEE, 2023. http://dx.doi.org/10.1109/southeastcon51012.2023.10115132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barbu, Ionutdaniel, Gabriel Petrica, Sabinadaniela Axinte, and Ioan Bacivarov. "ANALYZING CYBER THREAT ACTORS OF E-LEARNING PLATFORMS BY THE USE OF A HONEYNET CLOUD BASED INFRASTRUCTURE." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-226.

Full text
Abstract:
With the advent of Advanced Persistent Threats, the complexity of the techniques, tactics and procedures used by the adversaries increased significantly and it becomes more and more clear that all industries are ought to adapt to the emerging threat landscape. While analyzing various industries and the importance of risk assessment within each of them, the authors of this paper shifted their perspective and started a more in depth review of the e-learning environment. Because universities represent the birth place of research and development, they also represent high value targets for threat a
APA, Harvard, Vancouver, ISO, and other styles
5

De Sousa Drumond, Jose David, and Georgia Kotsiopoulou. "Building an Effective Ecosystem for an Integrated Community of Practice and Frustration-Free Technical Knowledge Hub that Maximizes Engagement and Participation of Local and Field Resources Across Multiple Operating Countries." In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/210844-ms.

Full text
Abstract:
Abstract Developing local resources and effectively transferring knowledge among young and seasoned practitioners, are key elements to enable the continuous creation of value in a transitioning energy market where sustainability, diversity and equity are in the spotlight. This paper presents the strategies employed to develop an integrated ecosystem within a Technical CoP, and the analytical criteria used for the record-time deployment of an almost cost-free and massive Knowledge Hub, resulting in an effective community-wide engagement. The current global challenges, and the need for transform
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!