Graph theory: A comprehensive survey about graph theory applications in computer science and social networks

A Majeed, I Rauf - Inventions, 2020 - mdpi.com
Graph theory (GT) concepts are potentially applicable in the field of computer science (CS)
for many purposes. The unique applications of GT in the CS field such as clustering of web …

Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning

AR Muhammad, P Sukarno, AA Wardana - Procedia Computer Science, 2023 - Elsevier
Abstract This research builds Security Information & Event Management (SIEM) based on
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …

A review of cyber vigilance tasks for network defense

OA Guidetti, C Speelman, P Bouhlas - Frontiers in Neuroergonomics, 2023 - frontiersin.org
The capacity to sustain attention to virtual threat landscapes has led cyber security to
emerge as a new and novel domain for vigilance research. However, unlike classic …

Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs

J Manzoor, A Waleed, AF Jamali, A Masood - Plos one, 2024 - journals.plos.org
The proliferation of cyber threats necessitates robust security measures to safeguard critical
assets and data in today's evolving digital landscape. Small and Medium Enterprises …

Application of graph domination to defend medical information networks against cyber threats

D Angel - Journal of Ambient Intelligence and Humanized …, 2022 - Springer
The principal and supreme concern in medical information systems is the issue of safe
guarding the electronic health records of patients. Defending a health care industry's …

[PDF][PDF] A Survey on Network Security Monitoring: Tools and Functionalities

ZS Younus, M Alanezi - Mustansiriyah Journal of Pure and Applied Sciences, 2023 - iasj.net
Recently, cybersecurity breaches have become more common, with varying levels of impact
ranging from simple to major losses of financial resources or data. The network …

Detection and Prevention System on Computer Network to Handle Distributed Denial-Of-Service (Ddos) Attack in Realtime and Multi-Agent

JR Nandaputra, P Sukarno, AA Wardana - Proceedings of the 2024 10th …, 2024 - dl.acm.org
This research builds a realtime and multi-agent system to handle Distributed Denial of
Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security …

User behaviour based insider threat detection in critical infrastructures

M Singh, BM Mehtre… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
Cyber security is an important concern in critical infrastructures such as banking and
financial organizations, where a number of malicious insiders are involved. These insiders …

Protection of medical information systems against cyber attacks: a graph theoretical approach

D Angel - Wireless Personal Communications, 2022 - Springer
Securing electronic health records of patients is the paramount concern in medical
information systems which faces unique set of challenges. Safeguarding a health care's …

Security enhancement in mobile ad-hoc network using novel data integrity based hash protection process

S Kumar - Wireless Personal Communications, 2022 - Springer
Abstract Nowadays, Mobile Ad hoc Networks (MANET) are utilized in numerous applications
like disaster management, environmental monitoring, tactical operations, and so on. Usually …