Attacker behaviour forecasting using methods of intelligent data analysis: A comparative review and prospects

E Doynikova, E Novikova, I Kotenko - Information, 2020 - mdpi.com
Early detection of the security incidents and correct forecasting of the attack development is
the basis for the efficient and timely response to cyber threats. The development of the attack …

[PDF][PDF] Cloud computing security case studies and research

C Barron, H Yu, J Zhan - Proceedings of the world congress on …, 2013 - iaeng.org
Cloud computing is an emerging technological paradigm that provides a flexible and
scalable information technology infrastructure to enable business agility. There are different …

A cyber attack modeling and impact assessment framework

I Kotenko, A Chechulin - 2013 5th International Conference on …, 2013 - ieeexplore.ieee.org
The paper suggests a framework for cyber attack modeling and impact assessment. It is
supposed that the common approach to attack modeling and impact assessment is based …

Применение технологии управления информацией и событиями безопасности для защиты информации в критически важных инфраструктурах

ИВ Котенко, ИБ Саенко… - Информатика и …, 2012 - proceedings.spiiras.nw.ru
Аннотация Применение SIEM-технологии (технологии управления информацией и
событиями безопасности) является перспективным направлением в области защиты …

Common framework for attack modeling and security evaluation in SIEM systems

I Kotenko, A Chechulin - 2012 IEEE International Conference …, 2012 - ieeexplore.ieee.org
The paper suggests a framework for attack modeling and security evaluation in Security
Information and Event Management (SIEM) systems. It is supposed that the common …

A semantic model for security evaluation of information systems

E Doynikova, A Fedorchenko… - Journal of Cyber …, 2020 - journals.riverpublishers.com
Modern information systems are characterized by huge security related data streams. For
cyber security management in such systems, novel models and techniques for efficient …

Анализ методов корреляции событий безопасности в SIEM-системах. Часть 1.

АВ Федорченко, ДС Левшун, АА Чечулин… - Информатика и …, 2016 - plantprotect.ru
Аннотация Статья посвящена анализу методов корреляции событий безопасности в
системах управления информацией и событиями безопасности (SIEM-системах) …

Analytical visualization techniques for security information and event management

E Novikova, I Kotenko - 2013 21st Euromicro International …, 2013 - ieeexplore.ieee.org
The paper proposes the architecture of the visualization component for the Security
Information and Event Management (SIEM) system. The SIEM systems help to comprehend …

Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review

AM Ansari, M Nazir, K Mustafa - Journal of Network and Systems …, 2024 - Springer
The smart home is one of the most significant applications of Internet of Things (IoT). Smart
home is basically the combination of different components like devices, hub, cloud, and …

Modelling and analysis of social engineering threats using the attack tree and the Markov model

M Aijaz, M Nazir - International Journal of Information Technology, 2024 - Springer
Abstract Social Engineering Threats (SETs) exploit human vulnerabilities in information
system security. Due to its ability to bypass technical security, these threats have become a …