Sign Up to like & get
recommendations!
1
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-1317-2
Abstract: We introduce VisIDAC presented in Song at al (In: Nguyen, P.Q., Zhou, J. (eds.) Information Security—20th International Conference, ISC 2017, Security and Cryptology, vol. 10599. Springer International Publishing, 2017), which is a 3-D real-time visualization…
read more here.
Keywords:
security events;
visualization security;
security;
security event ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3168976
Abstract: Security event correlation approaches are necessary to detect and predict incremental threats such as multi-step or targeted attacks (advanced persistent threats) and other causal sequences of abnormal events. The use of security event correlation techniques…
read more here.
Keywords:
event;
correlation methods;
security event;
correlation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Bit Numerical Mathematics"
DOI: 10.26583/bit.2017.4.06
Abstract: В настоящей статье рассматривается актуальная задача в области защиты информации, обусловленная отсутствием алгоритмического аппарата управления событиями безопасности и автоматизации процедур определения набора регистрируемых событий безопасности. В первой части статьи сформулирована постановка математической задачи, подлежащей автоматизации…
read more here.
Keywords:
event management;
management development;
software security;
security event ... See more keywords