[HTML][HTML] Systematic review of graphical visual methods in honeypot attack data analysis

G Ikuomenisan, Y Morgan - Journal of Information Security, 2022‏ - scirp.org
Mitigating increasing cyberattack incidents may require strategies such as reinforcing
organizations' networks with Honeypots and effectively analyzing attack traffic for detection …

A neural-visualization IDS for honeynet data

A Herrero, U Zurutuza, E Corchado - International Journal of Neural …, 2012‏ - World Scientific
Neural intelligent systems can provide a visualization of the network traffic for security staff,
in order to reduce the widely known high false-positive rate associated with misuse-based …

Beta-Hebbian Learning to enhance unsupervised exploratory visualizations of Android malware families

N Basurto, D García-Prieto, H Quintián… - Logic Journal of the …, 2024‏ - academic.oup.com
As it is well known, mobile phones have become a basic gadget for any individual that
usually stores sensitive information. This mainly motivates the increase in the number of …

Methods for post-processing of alerts in intrusion detection: A survey

G Spathoulas, S Katsikas - International Journal of Information …, 2013‏ - dergipark.org.tr
Intrusion detection is an important protection tool for computer systems and networks. In
recent years it has become an essential piece in the IT security infrastructure of large …

Embedded systems security: A survey of EU research efforts

C Manifavas, K Fysarakis… - Security and …, 2015‏ - Wiley Online Library
Embedded systems security is a recurring theme in current research efforts, brought in the
limelight by the wide adoption of ubiquitous devices. Significant funding has been allocated …

Advanced 3d visualization of android malware families

N Basurto, H Quintián, D Urda, JL Calvo-Rolle… - … Intelligence in Security …, 2022‏ - Springer
The number of attacks aimed at compromising smartphones in general, and Android devices
in particular, is acknowledged as one of the main security concerns of these devices …

Research and Application of Network Security Situational Awareness Technology Based on Ridge Regression

X Li, K Wei, H Gu, B Liu - … of the 2nd International Conference on Signal …, 2023‏ - dl.acm.org
In order to cope with increasingly complex network security issues, traditional rule-based
network security monitoring techniques cannot predict unknown network intrusion methods …

[PDF][PDF] Modelo ontológico para la predicción de ataques informáticos a partir de Honeynets virtualizadas.

P Gaona-García, C Montenegro-Marín… - Revista Logos, Ciencia …, 2016‏ - redalyc.org
Las honeynets son herramientas de seguridad informáticas usadas con el propósito de
reunir información de posibles atacantes acerca de las vulnerabilidades presentes en la …

A study of factors influencing cyberattacks

GT Ikuomenisan - 2022‏ - search.proquest.com
There has been a substantial global cyberattack evolution and Internet Use revolution
during the current Coronavirus pandemic, consequently forcing countries across the globe …

Advanced 3D Visualization of Android Malware Families

Á Herrero, E Corchado - … in Security for Information Systems and …, 2021‏ - books.google.com
The number of attacks aimed at compromising smartphones in general, and Android devices
in particular, is acknowledged as one of the main security concerns of these devices …