Добірка наукової літератури з теми "Cyber alerts"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Cyber alerts".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Cyber alerts"
Chen, Haipeng, Andrew Duncklee, Sushil Jajodia, Rui Liu, Sean Mcnamara, and V. S. Subrahmanian. "PCAM: A Data-driven Probabilistic Cyber-alert Management Framework." ACM Transactions on Internet Technology 22, no. 3 (August 31, 2022): 1–24. http://dx.doi.org/10.1145/3511101.
Повний текст джерелаAlbasheer, Hashim, Maheyzah Md Siraj, Azath Mubarakali, Omer Elsier Tayfour, Sayeed Salih, Mosab Hamdan, Suleman Khan, Anazida Zainal, and Sameer Kamarudeen. "Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey." Sensors 22, no. 4 (February 15, 2022): 1494. http://dx.doi.org/10.3390/s22041494.
Повний текст джерелаAlmseidin, Mohammad, Mouhammad Alkasassbeh, Maen Alzubi, and Jamil Al-Sawwa. "Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation." Cryptography 6, no. 2 (May 7, 2022): 24. http://dx.doi.org/10.3390/cryptography6020024.
Повний текст джерелаCheng, Xiang, Jiale Zhang, and Bing Chen. "Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation." Sensors 19, no. 18 (September 19, 2019): 4045. http://dx.doi.org/10.3390/s19184045.
Повний текст джерелаGay, Chris, Barry Horowitz, John Elshaw, Philip Bobko, and Inki Kim. "Operator Suspicion and Decision Responses to Cyber-Attacks on Unmanned Ground Vehicle Systems." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 226–30. http://dx.doi.org/10.1177/1541931213601540.
Повний текст джерелаAngelini, Marco, and Giuseppe Santucci. "Cyber situational awareness: from geographical alerts to high-level management." Journal of Visualization 20, no. 3 (July 12, 2016): 453–59. http://dx.doi.org/10.1007/s12650-016-0377-3.
Повний текст джерелаYang, Gang, Chaojing Tang, and Xingtong Liu. "DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective." Symmetry 14, no. 10 (October 13, 2022): 2138. http://dx.doi.org/10.3390/sym14102138.
Повний текст джерелаPriyawati, Diah, Siti Rokhmah, and Ihsan Cahyo Utomo. "Website Vulnerability Testing and Analysis of Website Application Using OWASP." International Journal of Computer and Information System (IJCIS) 3, no. 3 (August 29, 2022): 142–47. http://dx.doi.org/10.29040/ijcis.v3i3.90.
Повний текст джерелаSahu, Abhijeet, and Katherine Davis. "Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach." Sensors 22, no. 6 (March 9, 2022): 2100. http://dx.doi.org/10.3390/s22062100.
Повний текст джерелаKhosravi, Mehran, and Behrouz Tork Ladani. "Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection." IEEE Access 8 (2020): 162642–56. http://dx.doi.org/10.1109/access.2020.3021499.
Повний текст джерелаДисертації з теми "Cyber alerts"
Clarke, Karla A. "Novel Alert Visualization: The Development of a Visual Analytics Prototype for Mitigation of Malicious Insider Cyber Threats." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1049.
Повний текст джерелаAfzaliSeresht, Neda. "Explainable Intelligence for Comprehensive Interpretation of Cybersecurity Data in Incident Management." Thesis, 2022. https://vuir.vu.edu.au/44414/.
Повний текст джерелаMargarido, Daniel Ribeiro. "Waldo, the virtual & intelligent cyber analyst." Master's thesis, 2017. http://hdl.handle.net/10400.26/25336.
Повний текст джерелаWu, Chia-Wei, and 吳嘉偉. "Cyber Security Vulnerabilities Alert System Based on Information from Twitter and CVE." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394022%22.&searchmode=basic.
Повний текст джерела國立中興大學
資訊科學與工程學系所
107
Most of the computer system users don’t quite understand the system vulnerabilities and their threats to information security. As a result, hackers are able to exploit the vulnerabilities to attack the system. In addition, the attack methods and tools can be easily obtained through the Internet nowadays, which makes zero-day or N-day attacks much easier and faster. But anti-virus software and firewalls cannot completely prevent this kind of attacks resulted in system vulnerabilities. In this thesis, we try to build a system vulnerability precaution system for computer users or system administrators by analyzing information from Twitter and Common Vulnerabilities and Exposures (CVE). The tweets from security experts and the articles released by CVE are extracted in an hourly and daily basis, respectively. Then the Convolutional Neural Network (CNN) and Bidirectional LSTM Network (Bi-LSTM) are used to train a Named Entity Recognition (NER) model to identify and tag keywords about product security, product name, version, vulnerability, attack methods, etc. The proposed system also maintains the system profile of the systems that are under monitored. Once the tagged keywords returned by NER match one of the system profile, the proposed system will send warning messages to the user or administrator. The experimental results show that the proposed method has better performance in extracting and tagging keywords than other methods. The experiments are performed using two word representations: Stanford Glove and Google word2vec. In either representation, the proposed method has more than 95% of performance in terms of precision, recall, and F1-measure.
Ghafir, Ibrahim, M. Hammoudeh, V. Prenosil, L. Han, R. Hegarty, K. Rabie, and F. J. Aparicio-Navarro. "Detection of advanced persistent threat using machine-learning correlation analysis." 2018. http://hdl.handle.net/10454/17614.
Повний текст джерелаAs one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the targeted system, which has the potential to cause significant damage and substantial financial loss. The accurate detection and prediction of APT is an ongoing challenge. This work proposes a novel machine learning-based system entitled MLAPT, which can accurately and rapidly detect and predict APT attacks in a systematic way. The MLAPT runs through three main phases: (1) Threat detection, in which eight methods have been developed to detect different techniques used during the various APT steps. The implementation and validation of these methods with real traffic is a significant contribution to the current body of research; (2) Alert correlation, in which a correlation framework is designed to link the outputs of the detection methods, aims to identify alerts that could be related and belong to a single APT scenario; and (3) Attack prediction, in which a machine learning-based prediction module is proposed based on the correlation framework output, to be used by the network security team to determine the probability of the early alerts to develop a complete APT attack. MLAPT is experimentally evaluated and the presented system is able to predict APT in its early steps with a prediction accuracy of 84.8%.
Книги з теми "Cyber alerts"
Streeter, Michael, and Peter Warren. Cyber Alert: How the World Is Under Attack from a New Form of Crime. Vision, 2005.
Знайти повний текст джерелаЧастини книг з теми "Cyber alerts"
Burkart, Nadia, Maximilian Franz, and Marco F. Huber. "Explanation Framework for Intrusion Detection." In Machine Learning for Cyber Physical Systems, 83–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-62746-4_9.
Повний текст джерелаWurzenberger, Markus, Max Landauer, Agron Bajraktari, and Florian Skopik. "Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation." In Cybersecurity of Digital Service Chains, 136–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_7.
Повний текст джерелаCheng, Xiang, Jiale Zhang, and Bing Chen. "Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension." In Communications in Computer and Information Science, 123–38. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0758-8_10.
Повний текст джерелаBahaa-Eldin, Ayman M. "A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and Events." In Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 3–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43616-5_1.
Повний текст джерелаDunstatter, Noah, Alireza Tahsini, Mina Guirguis, and Jelena Tešić. "Solving Cyber Alert Allocation Markov Games with Deep Reinforcement Learning." In Lecture Notes in Computer Science, 164–83. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32430-8_11.
Повний текст джерелаLeeuw, H. B. M. "Using Big Data to Study Digital Piracy and the Copyright Alert System 1." In Cyber Society, Big Data, and Evaluation, 97–116. New Brunswick: Transaction Publishers, [2017] | Series:: Routledge, 2017. http://dx.doi.org/10.4324/9780203793909-6.
Повний текст джерелаGanesan, Rajesh, Ankit Shah, Sushil Jajodia, and Hasan Cam. "Optimizing Alert Data Management Processes at a Cyber Security Operations Center." In Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 206–31. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6_9.
Повний текст джерелаGanesan, Rajesh, and Ankit Shah. "A Strategy for Effective Alert Analysis at a Cyber Security Operations Center." In Lecture Notes in Computer Science, 206–26. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04834-1_11.
Повний текст джерелаFunke, Gregory, Gregory Dye, Brett Borghetti, Vincent Mancuso, Eric Greenlee, Brent Miller, Lauren Menke, Rebecca Brown, and Alex Vieane. "Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)." In Advances in Intelligent Systems and Computing, 363–76. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41932-9_30.
Повний текст джерелаRiebe, Thea, Tristan Wirth, Markus Bayer, Philipp Kühn, Marc-André Kaufhold, Volker Knauthe, Stefan Guthe, and Christian Reuter. "CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data." In Information and Communications Security, 429–46. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86890-1_24.
Повний текст джерелаТези доповідей конференцій з теми "Cyber alerts"
Wu, Mingtao, and Young B. Moon. "Intrusion Detection of Cyber-Physical Attacks in Manufacturing Systems: A Review." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10135.
Повний текст джерелаSchlenker, Aaron, Haifeng Xu, Mina Guirguis, Christopher Kiekintveld, Arunesh Sinha, Milind Tambe, Solomon Sonya, Darryl Balderas, and Noah Dunstatter. "Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/54.
Повний текст джерелаBrosset, David, Camille Cavelier, Benjamin Coste, Yvon Kermarrec, Joffrey Lartigaud, and Pedro Merino Laso. "Cr@ck3n: A cyber alerts visualization object." In 2017 International Conference on Cyber-Situational Awareness, Data Analytics and Assessment (Cyber SA). IEEE, 2017. http://dx.doi.org/10.1109/cybersa.2017.8073401.
Повний текст джерелаDunstatter, Noah, Mina Guirguis, and Alireza Tahsini. "Allocating Security Analysts to Cyber Alerts Using Markov Games." In 2018 National Cyber Summit (NCS). IEEE, 2018. http://dx.doi.org/10.1109/ncs.2018.00008.
Повний текст джерелаCappers, Bram C. M., and Jarke J. van Wijk. "Understanding the context of network traffic alerts." In 2016 IEEE Symposium on Visualization for Cyber Security (VizSec). IEEE, 2016. http://dx.doi.org/10.1109/vizsec.2016.7739579.
Повний текст джерелаKidmose, Egon, Matija Stevanovic, and Jens Myrup Pedersen. "Correlating intrusion detection alerts on bot malware infections using neural network." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 2016. http://dx.doi.org/10.1109/cybersecpods.2016.7502344.
Повний текст джерелаAfzaliSeresht, Neda, Yuan Miao, Qing Liu, Assefa Teshome, and Wenjie Ye. "Investigating cyber alerts with graph-based analytics and narrative visualization." In 2020 24th International Conference Information Visualisation (IV). IEEE, 2020. http://dx.doi.org/10.1109/iv51561.2020.00090.
Повний текст джерелаVaarandi, Risto. "A Stream Clustering Algorithm for Classifying Network IDS Alerts." In 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2021. http://dx.doi.org/10.1109/csr51186.2021.9527926.
Повний текст джерелаMoskal, Stephen, Shanchieh Jay Yang, and Michael E. Kuhl. "Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts." In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2018. http://dx.doi.org/10.1109/isi.2018.8587402.
Повний текст джерелаCam, Hasan, and Pierre Mouallem. "Risk-driven aggregation and transmission prioritization of cyber alerts over mobile networks." In 2014 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2014. http://dx.doi.org/10.1109/iccnc.2014.6785305.
Повний текст джерела