Summary of research on IT network and industrial control network security assessment
L Hu, H Li, Z Wei, S Dong… - 2019 IEEE 3rd information …, 2019 - ieeexplore.ieee.org
The difference between traditional IT network and industrial control network determines the
different methods of network security assessment. In the face of increasingly serious …
different methods of network security assessment. In the face of increasingly serious …
Detection and Prevention System on Computer Network to Handle Distributed Denial-Of-Service (Ddos) Attack in Realtime and Multi-Agent
This research builds a realtime and multi-agent system to handle Distributed Denial of
Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security …
Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security …
[CITACE][C] 网络安全态势感知综述
龚俭, 臧小东, 苏琪, 胡晓艳, 徐杰 - 软件学报, 2016
Cybersecurity Incident Response Orchestration Using Agile Cognitive Assistants
S Meckl - 2019 - search.proquest.com
In this work, I explore the problem of autonomously orchestrating cybersecurity incident
response using agile cognitive assistants. Detection of sophisticated cyber threat activity has …
response using agile cognitive assistants. Detection of sophisticated cyber threat activity has …
[HTML][HTML] 基于虚拟机回放的恶意行为检测技术
尹**光, 余荣威, 王丽娜, 刘维杰, 宋衍, 谈诚 - 武汉大学学报 (理学版), 2016 - xml-data.org
云计算环境下高灵活性, 高扩展性, 边界泛化等特性, 使得已有的恶意行为检测技术误检率高,
未知恶意行为检测能力低下. 本文提出了基于虚拟机回放的恶意行为检测模型 …
未知恶意行为检测能力低下. 本文提出了基于虚拟机回放的恶意行为检测模型 …
[CITACE][C] Survey of network security situation awareness
龚俭, 臧小东, 苏琪, 胡晓艳, 徐杰 - Journal of Software, 2016