[HTML][HTML] A data anonymization methodology for security operations centers: Balancing data protection and security in industrial systems

G Longo, F Lupia, A Merlo, F Pagano, E Russo - Information Sciences, 2025 - Elsevier
In an era where industrial Security Operations Centers (SOCs) are paramount to enabling
cybersecurity, they can unintentionally become enablers of intellectual property theft through …

DBD-Guardian and Privacy-Aware Near Real-Time Cybersecurity Analytics

J Frade, L Santos, RLC Costa - IEEE Access, 2024 - ieeexplore.ieee.org
Big Data Cybersecurity Analytics (BDCA) is a helpful tool for cybersecurity maintenance that
may support the identification of potential threats. Data preparation for traditional BDCA …

A Proactive Approach to Advanced Cyber Threat Hunting

MS Kulkarni, DH Ashit… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Organizations strive to secure their valuable data and minimise potential damages,
recognising that critical operations are susceptible to attacks. This research paper seeks to …

[PDF][PDF] Systematization of Processes of Value-Creating Activities of Operational Sustainability and Social Responsibility

R Vanickova - Economics and Culture, 2024 - sciendo.com
Research purpose. The primary objective is to create a proposal for a project on the
implementation of GDPR into the process management of an organization. The secondary …

Case Study of Memphis Inc.'s Cybersecurity Breach

SA Boyd - Real-World Solutions for Diversity, Strategic Change …, 2023 - igi-global.com
In a world where cybersecurity breaches could cause reputational and financial loss,
understanding how an organization can recover is paramount. This case study will cover an …