Summary of research on IT network and industrial control network security assessment

L Hu, H Li, Z Wei, S Dong… - 2019 IEEE 3rd information …, 2019 - ieeexplore.ieee.org
The difference between traditional IT network and industrial control network determines the
different methods of network security assessment. In the face of increasingly serious …

Detection and Prevention System on Computer Network to Handle Distributed Denial-Of-Service (Ddos) Attack in Realtime and Multi-Agent

JR Nandaputra, P Sukarno, AA Wardana - Proceedings of the 2024 10th …, 2024 - dl.acm.org
This research builds a realtime and multi-agent system to handle Distributed Denial of
Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security …

[CITACE][C] 网络安全态势感知综述

龚俭, 臧小东, 苏琪, 胡晓艳, 徐杰 - 软件学报, 2016

Cybersecurity Incident Response Orchestration Using Agile Cognitive Assistants

S Meckl - 2019 - search.proquest.com
In this work, I explore the problem of autonomously orchestrating cybersecurity incident
response using agile cognitive assistants. Detection of sophisticated cyber threat activity has …

[HTML][HTML] 基于虚拟机回放的恶意行为检测技术

尹**光, 余荣威, 王丽娜, 刘维杰, 宋衍, 谈诚 - 武汉大学学报 (理学版), 2016 - xml-data.org
云计算环境下高灵活性, 高扩展性, 边界泛化等特性, 使得已有的恶意行为检测技术误检率高,
未知恶意行为检测能力低下. 本文提出了基于虚拟机回放的恶意行为检测模型 …

[CITACE][C] Survey of network security situation awareness

龚俭, 臧小东, 苏琪, 胡晓艳, 徐杰 - Journal of Software, 2016