Intelligent process automation and business continuity: Areas for future research

J Brás, R Pereira, S Moro - Information, 2023 - mdpi.com
Robotic process automation and intelligent process automation have gained a foothold in
the automation of business processes, using blocks of software (bots). These agents interact …

A primer on insider threats in cybersecurity

S Prabhu, N Thompson - Information Security Journal: A Global …, 2022 - Taylor & Francis
Though human factors are increasingly being acknowledged as a contributor to
cybersecurity incidents, this domain is not widely understood by those in technical and …

CRUSOE: A toolset for cyber situational awareness and decision support in incident handling

M Husák, L Sadlek, S Špaček, M Laštovička… - Computers & …, 2022 - Elsevier
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …

SoK: applications and challenges of using recommender systems in cybersecurity incident handling and response

M Husák, M Čermák - Proceedings of the 17th International Conference …, 2022 - dl.acm.org
Incident handling, a fundamental activity of a cybersecurity incident response team, is a
complex discipline that consumes a significant amount of personnel's time and costs. There …

An Interview Study on {Third-Party} Cyber Threat Hunting Processes in the {US}. Department of Homeland Security

WP Maxam III, JC Davis - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Cybersecurity is a major challenge for large organizations. Traditional cybersecurity defense
is reactive. Cybersecurity operations centers keep out adversaries and incident response …

Empowering Security Operation Center with Artificial Intelligence and Machine Learning–A Systematic Literature Review

M Khayat, E Barka, MA Serhani, F Sallabi… - IEEE …, 2025 - ieeexplore.ieee.org
Organizational cybersecurity relies heavily on security operation centers (SOCs) to protect
businesses and institutions from emerging cyber threats. In recent years, the complexity and …

Electrical connector

C Eitschberger - US Patent 11,293,736, 2022 - Google Patents
Related US Application Data (60) Continuation-in-part of application No. 16/423,789, filed
on May 28, 2019, now Pat. No. 10,982,941, which is continuation of application No …

Towards a data-driven recommender system for handling ransomware and similar incidents

M Husák - 2021 IEEE International Conference on Intelligence …, 2021 - ieeexplore.ieee.org
Effective triage is of utmost importance for cybersecurity incident response, namely in
handling ransomware or similar incidents in which the attacker may use self-propagating …

Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions

SRB Mohd Kassim, S Li, B Arief - Digital Threats: Research and Practice, 2023 - dl.acm.org
National Computer Security Incident Response Teams (CSIRTs) have been established
worldwide to coordinate responses to computer security incidents at the national level. While …

On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features

L Nitz, MA Gurabi, M Cermak, M Zadnik… - … Threats: Research and …, 2024 - dl.acm.org
Organizations and their security operation centers often struggle to detect and respond
effectively to an extensive quantity of ever-evolving cyberattacks. While collaboration, such …