False alarm minimization techniques in signature-based intrusion detection systems: A survey

N Hubballi, V Suryanarayanan - Computer Communications, 2014 - Elsevier
A network based Intrusion Detection System (IDS) gathers and analyzes network packets
and report possible low level security violations to a system administrator. In a large network …

A systematic survey on multi-step attack detection

J Navarro, A Deruyver, P Parrend - Computers & Security, 2018 - Elsevier
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …

A data triage retrieval system for cyber security operations center

T Lin - 2018 - etda.libraries.psu.edu
Triage analysis is a fundamental stage in cyber operations in Security Operations Centers
(SOCs). The massive data sources generate great demands on cyber security analysts' …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Alert correlation in collaborative intelligent intrusion detection systems—A survey

HT Elshoush, IM Osman - Applied Soft Computing, 2011 - Elsevier
As complete prevention of computer attacks is not possible, intrusion detection systems
(IDSs) play a very important role in minimizing the damage caused by different computer …

Supporting a work packet request with a specifically tailored IDE

JK Chaar, JP Huchel, TA Jobson Jr - US Patent 8,336,026, 2012 - Google Patents
(57) ABSTRACT A method, system, and computer-readable medium for aiding a user who is
servicing a work packet request in a Software factory. A full work packet-aware Integrated …

Software factory

JK Chaar, RD Finlayson, JP Giraldo, SR Lang… - US Patent …, 2013 - Google Patents
(57) ABSTRACT A method, system and computer-readable medium for creat ing Software in
a standardized manner are presented. The method includes the steps of receiving, at a …

Work packet enabled active project management schedule

JK Chaar, JP Huchel, TA Jobson Jr… - US Patent …, 2014 - Google Patents
(57) ABSTRACT A method for managing projects in a software factory is presented. A project
management tool includes an end-to-end project plan for a project to create a software …

We have met the enemy and he is us

M Bishop, S Engle, S Peisert, S Whalen… - Proceedings of the 2008 …, 2008 - dl.acm.org
The insider threat has long been considered one of the most serious threats in computer
security, and one of the most difficult to combat. But the problem has never been defined …

Using tpms to secure vehicular ad-hoc networks (vanets)

G Guette, C Bryce - IFIP International Workshop on Information Security …, 2008 - Springer
Abstract Vehicular Ad hoc Networks are the focus of increased attention by vehicle
manufacturers. However, their deployment requires that security issues be resolved …