Academic literature on the topic 'Cybersecurity Operations Center'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Operations Center.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity Operations Center"
BOLILYI, V. O., L. P. SUKHOVIRSKA та O. M. LUNHOL. "ОПЕРАЦІЙНИЙ ЦЕНТР БЕЗПЕКИ ЯК ПОСЛУГА НА ОСНОВІ SIEM". Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 1, № 2 (2021): 177–86. http://dx.doi.org/10.31494/2412-9208-2021-1-2-177-186.
Full textI, Putu Elba Duta Nugraha. "A Review on the Role of Modern SOC in Cybersecurity Operations." International Journal of Current Science Research and Review 04, no. 05 (2021): 408–14. https://doi.org/10.47191/ijcsrr/V4-i5-13.
Full textTaylor, Ivan W., and Keith D. Willett. "Modeling Cybersecurity Operations to Improve Resilience." INCOSE International Symposium 34, no. 1 (2024): 53–71. http://dx.doi.org/10.1002/iis2.13132.
Full textDr.A.Shaji, George, and George A.S.Hovan. "Anatomy of Cybersecurity." Partners Universal Multidisciplinary Research Journal (PUMRJ) 02, no. 01 (2025): 1–6. https://doi.org/10.5281/zenodo.14738079.
Full textShah, Ankit, Rajesh Ganesan, Sushil Jajodia, and Hasan Cam. "Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center." IEEE Systems Journal 13, no. 1 (2019): 1060–71. http://dx.doi.org/10.1109/jsyst.2018.2809506.
Full textShah, Ankit, Rajesh Ganesan, Sushil Jajodia, and Hasan Cam. "An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center." ACM Transactions on the Web 14, no. 1 (2020): 1–22. http://dx.doi.org/10.1145/3372498.
Full textKen, Basari, and Aldianto Leo. "Adopting Security Operation Center: Insights from the Indonesian Financial Sector." International Journal of Current Science Research and Review 08, no. 03 (2025): 1051–66. https://doi.org/10.5281/zenodo.14978634.
Full textIsmail, Rahmat Kurnia, Farid Widyatama, et al. "Enhancing Security Operations Center: Wazuh Security Event Response with Retrieval-Augmented-Generation-Driven Copilot." Sensors 25, no. 3 (2025): 870. https://doi.org/10.3390/s25030870.
Full textHámornik, Balázs Péter, and Csaba Krasznay. "Prerequisites of Virtual Teamwork in Security Operations Centers: Knowledge, Skills, Abilities and Other Characteristics." Academic and Applied Research in Military and Public Management Science 16, no. 3 (2017): 73–92. http://dx.doi.org/10.32565/aarms.2017.3.5.
Full textBassey, Christian, Ebenezer Tonye Chinda, and Samson Idowu. "Building a Scalable Security Operations Center: A Focus on Open-source Tools." Journal of Engineering Research and Reports 26, no. 7 (2024): 196–209. http://dx.doi.org/10.9734/jerr/2024/v26i71203.
Full textDissertations / Theses on the topic "Cybersecurity Operations Center"
Cardarelli, Anthony. "Automated Deployment of a Security Operations Center." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592133599167901.
Full textElisa, Francesco Lupo. "A Situational Awareness Dashboard for a Security Operations Center." Master's thesis, 2021. http://hdl.handle.net/10362/133360.
Full textMateus, Marco Alexandre Clemente. "HANDLING CYBERSECURITY RELATED INCIDENTS IN THE SECURITY OPERATION CENTER OF THE POLYTECHNIC OF LEIRIA." Master's thesis, 2021. http://hdl.handle.net/10400.8/6695.
Full textBooks on the topic "Cybersecurity Operations Center"
National Cybersecurity and Communications Integration Center Act of 2014: Report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 2519, to codify an existing operations center for cybersecurity. U.S. Government Printing Office, 2014.
Find full textMcLaughlin, Kevin Lynn. Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy. Taylor & Francis Group, 2023.
Find full textMcLaughlin, Kevin Lynn. Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy. Taylor & Francis Group, 2023.
Find full textMcLaughlin, Kevin Lynn. Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy. Taylor & Francis Group, 2023.
Find full textMcLaughlin, Kevin Lynn. Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy. Taylor & Francis Group, 2023.
Find full textBook chapters on the topic "Cybersecurity Operations Center"
McLaughlin, Kevin Lynn. "Cybersecurity Operations and Fusion Center." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-7.
Full textThompson, Eric C. "HIPAA Security Rule and Cybersecurity Operations." In Designing a HIPAA-Compliant Security Operations Center. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5608-4_2.
Full textMcLaughlin, Kevin Lynn. "What Is a Cybersecurity Operations and Fusion Center (SOFC) and Why Do You Need One?" In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-2.
Full textGanesan, Rajesh, Ankit Shah, Sushil Jajodia, and Hasan Cam. "A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center." In Network Security Metrics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_8.
Full textDimitrov, Willian, Georgi Dimitrov, Kamen Spasov, and Svetlana Syarova. "Conceptual Model for a Shared Cybersecurity Operations Center for ICS." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90321-3_40.
Full textDeCusatis, C., R. Cannistra, A. Labouseur, and M. Johnson. "Design and Implementation of a Research and Education Cybersecurity Operations Center." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16837-7_13.
Full textNikolov, Borislav M. "Improving Cybersecurity Capabilities at Nikola Vaptsarov Naval Academy by Building and Developing a Security Operations and Training Center." In Communications in Computer and Information Science. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44440-1_30.
Full textMcLaughlin, Kevin Lynn. "Foundations of Security Operations or SecOps." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-8.
Full textMcLaughlin, Kevin Lynn. "SOFC Infrastructure and Toolset." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-6.
Full textMcLaughlin, Kevin Lynn. "Detection, Response, and Remediation." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-9.
Full textConference papers on the topic "Cybersecurity Operations Center"
Falé, Pedro, Leonilde Reis, and Rui Almeida. "Cybersecurity – Security Operations Center." In Sixth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2022. http://dx.doi.org/10.31410/itema.2022.99.
Full textGhosh, Anup K. "A Data-driven Approach to Rating Cybersecurity Risk and Investing SOC Resources Efficiently." In Workshop on Security Operation Center Operations and Construction. Internet Society, 2023. http://dx.doi.org/10.14722/wosoc.2023.23022.
Full textChang, Kevin, and Brett Seely. "The challenging nexus of technology and security in transportation management center operations." In CyberSec '18: Fifth Cybersecurity Symposium. ACM, 2018. http://dx.doi.org/10.1145/3212687.3212860.
Full textZhang, Yunpeng Jack, Kailai Wang, Lingguang Song, et al. "USDOT Tier-1 University Transportation Center for Advancing Cybersecurity Research and Education." In 2023 IEEE International Conference on Mobility, Operations, Services and Technologies (MOST). IEEE, 2023. http://dx.doi.org/10.1109/most57249.2023.00036.
Full textCram, W. Alec, and Ian Mckillop. "Evaluating a Cybersecurity Operations Center Implementation Program in a Regional Healthcare System: Challenges and Lessons Learned." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2024. https://doi.org/10.24251/hicss.2024.451.
Full textSavola, Reijo. "Towards Scalable Solutions of Operational Technology Cybersecurity in Smart Energy Networks." In 16th International Conference on Applied Human Factors and Ergonomics (AHFE 2025). AHFE International, 2025. https://doi.org/10.54941/ahfe1006141.
Full textAlhawas, Haya, Noura Althemali, Renad Alkhaldi, Renad Alziyadi, and Maali Alabdulhafith. "Flagged: Cybersecurity Training and Awareness System Through Virtual Reality." In 5th International Conference on Networks, Blockchain and Internet of Things. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.140505.
Full textTafa, Igli, and Kevin Shahollari. "Reducing Cyber Incident Response to Protect CNI from Cyber Attacks using an N-SIEM Integration with an ICTI-CNI." In 2nd International Conference on Machine Learning Techniques and Data Science (MLDS 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111818.
Full textOnwubiko, Cyril. "CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process." In 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2018. http://dx.doi.org/10.1109/cybersa.2018.8551486.
Full textMocanu, Florin, and Luminița Scripcariu. "Implementation of a Security Operation Center - An Essential Cybersecurity Solution for Organizations." In 2023 27th International Conference on System Theory, Control and Computing (ICSTCC). IEEE, 2023. http://dx.doi.org/10.1109/icstcc59206.2023.10308432.
Full textReports on the topic "Cybersecurity Operations Center"
Cary, Dakota. China’s CyberAI Talent Pipeline. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca017.
Full textNagle, Frank, James Dana, Jennifer Hoffman, Steven Randazzo, and Yanuo Zhou. Census II of Free and Open Source Software — Application Libraries. The Linux Foundation, 2022. https://doi.org/10.70828/kheh5209.
Full text