CRUSOE: A toolset for cyber situational awareness and decision support in incident handling
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …
[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …
asset, and vulnerability management. Estimating the operating system via network traffic …
Towards a data-driven recommender system for handling ransomware and similar incidents
M Husák - 2021 IEEE International Conference on Intelligence …, 2021 - ieeexplore.ieee.org
Effective triage is of utmost importance for cybersecurity incident response, namely in
handling ransomware or similar incidents in which the attacker may use self-propagating …
handling ransomware or similar incidents in which the attacker may use self-propagating …
Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph
We present an approach to decision support in cybersecurity with respect to cyber threats
and stakeholders' requirements. We approach situations in which cybersecurity experts …
and stakeholders' requirements. We approach situations in which cybersecurity experts …
[HTML][HTML] A trusted platform module-based, pre-emptive and dynamic asset discovery tool
This paper presents an original Intelligent and Secure Asset Discovery Tool (ISADT) that
uses artificial intelligence and TPM-based technologies to:(i) detect the network assets, and …
uses artificial intelligence and TPM-based technologies to:(i) detect the network assets, and …
[HTML][HTML] Design and implementation of network monitoring system for campus infrastructure using software agents
RI Espinel-Villalobos, E Ardila-Triana… - Ingeniería e …, 2022 - scielo.org.co
In network management and monitoring systems, or Network Management Stations (NMS),
the Simple Network monitoring Protocol (SNMP) is normally used, with which it is possible to …
the Simple Network monitoring Protocol (SNMP) is normally used, with which it is possible to …
[PDF][PDF] Design of network monitoring system based on LibreNMS using Line Notify, Telegram, and Email notification
Abstract Institut Teknologi Telkom Jakarta (IT Telkom Jakarta) is an educational institution
that supports student activities and provides internet capabilities to implement online …
that supports student activities and provides internet capabilities to implement online …
Current challenges of cyber threat and vulnerability identification using public enumerations
Identification of cyber threats is one of the essential tasks for security teams. Currently, cyber
threats can be identified using knowledge organized into various formats, enumerations …
threats can be identified using knowledge organized into various formats, enumerations …
Next-Generation Cyber Threat Intelligence Platform
AK Shaw - 2024 - search.proquest.com
Cyber threat intelligence (CTI) is critical for protecting an organization from cyber-attacks.
Analyzing CTI involves gathering information about an adversary's intentions, motivations …
Analyzing CTI involves gathering information about an adversary's intentions, motivations …
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network
Vulnerability assessment allows cyber security professionals to discover vulnerable end
devices. Generally, in such a process one extracts the default Service Banner (SB) from the …
devices. Generally, in such a process one extracts the default Service Banner (SB) from the …