CRUSOE: A toolset for cyber situational awareness and decision support in incident handling

M Husák, L Sadlek, S Špaček, M Laštovička… - Computers & …, 2022 - Elsevier
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …

[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges

M Laštovička, M Husák, P Velan, T Jirsík, P Čeleda - Computer Networks, 2023 - Elsevier
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …

Towards a data-driven recommender system for handling ransomware and similar incidents

M Husák - 2021 IEEE International Conference on Intelligence …, 2021 - ieeexplore.ieee.org
Effective triage is of utmost importance for cybersecurity incident response, namely in
handling ransomware or similar incidents in which the attacker may use self-propagating …

Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph

M Javorník, M Husák - Engineering Reports, 2022 - Wiley Online Library
We present an approach to decision support in cybersecurity with respect to cyber threats
and stakeholders' requirements. We approach situations in which cybersecurity experts …

[HTML][HTML] A trusted platform module-based, pre-emptive and dynamic asset discovery tool

AJ Diaz-Honrubia, AB Herranz, LP Santamaría… - Journal of Information …, 2022 - Elsevier
This paper presents an original Intelligent and Secure Asset Discovery Tool (ISADT) that
uses artificial intelligence and TPM-based technologies to:(i) detect the network assets, and …

[HTML][HTML] Design and implementation of network monitoring system for campus infrastructure using software agents

RI Espinel-Villalobos, E Ardila-Triana… - Ingeniería e …, 2022 - scielo.org.co
In network management and monitoring systems, or Network Management Stations (NMS),
the Simple Network monitoring Protocol (SNMP) is normally used, with which it is possible to …

[PDF][PDF] Design of network monitoring system based on LibreNMS using Line Notify, Telegram, and Email notification

NR Fachrurrozi, AA Wirabudi, SA Rozano - SINERGI, 2023 - academia.edu
Abstract Institut Teknologi Telkom Jakarta (IT Telkom Jakarta) is an educational institution
that supports student activities and provides internet capabilities to implement online …

Current challenges of cyber threat and vulnerability identification using public enumerations

L Sadlek, P Čeleda, D Tovarňák - Proceedings of the 17th International …, 2022 - dl.acm.org
Identification of cyber threats is one of the essential tasks for security teams. Currently, cyber
threats can be identified using knowledge organized into various formats, enumerations …

Next-Generation Cyber Threat Intelligence Platform

AK Shaw - 2024 - search.proquest.com
Cyber threat intelligence (CTI) is critical for protecting an organization from cyber-attacks.
Analyzing CTI involves gathering information about an adversary's intentions, motivations …

V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network

N Lu, R Huang, M Yao, W Shi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vulnerability assessment allows cyber security professionals to discover vulnerable end
devices. Generally, in such a process one extracts the default Service Banner (SB) from the …