A survey on cyber situation-awareness systems: Framework, techniques, and insights

H Alavizadeh, J Jang-Jaccard, SY Enoch… - ACM Computing …, 2022 - dl.acm.org
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that
are equipped with novel approaches to learn the system and propagate themselves, such as …

A survey of network anomaly visualization

T Zhang, X Wang, Z Li, F Guo, Y Ma… - Science China Information …, 2017 - Springer
Network anomaly analysis is an emerging subtopic of network security. Network anomaly
refers to the unusual behavior of network devices or suspicious network status. A number of …

Alert-driven attack graph generation using s-pdfa

A Nadeem, S Verwer, S Moskal… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …

Explainable artificial intelligence for resilient security applications in the Internet of Things

MT Masud, M Keshk, N Moustafa… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
The performance of Artificial Intelligence (AI) systems reaches or even exceeds that of
humans in an increasing number of complicated tasks. Highly effective non-linear AI models …

Interactive three-dimensional visualization of network intrusion detection data for machine learning

W Zong, YW Chow, W Susilo - Future Generation Computer Systems, 2020 - Elsevier
The threat of cyber-attacks is on the rise in the digital world today. As such, effective
cybersecurity solutions are becoming increasingly important for detecting and combating …

Bayesian network based weighted APT attack paths modeling in cloud computing

A Zimba, H Chen, Z Wang - Future Generation Computer Systems, 2019 - Elsevier
Security vulnerabilities exhibited in cloud computing components and technologies not
limited to hypervisors, virtual machines, and virtualization present a major security concern …

A review of visualization methods for cyber-physical security: Smart grid case study

V Cobilean, HS Mavikumbure, BJ Mcbride… - IEEE …, 2023 - ieeexplore.ieee.org
Cyber-Physical Systems (CPSs) are becoming increasingly complex and interconnected as
they attempt to meet the demands of evolving society. As a result, monitoring and …

Vulnus: Visual vulnerability analysis for network security

M Angelini, G Blasilli, T Catarci, S Lenti… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Vulnerabilities represent one of the main weaknesses of IT systems and the availability of
consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for …

Sage: Intrusion alert-driven attack graph extractor

A Nadeem, S Verwer, SJ Yang - 2021 IEEE symposium on …, 2021 - ieeexplore.ieee.org
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a
network. State-of-the-art approaches for AG generation focus mostly on deriving …

Evaluating visualization approaches to detect abnormal activities in network traffic data

SY Ji, BK Jeong, DH Jeong - International Journal of Information Security, 2021 - Springer
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …