Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

A framework for mastering heterogeneity in multi-layer security information and event correlation

L Coppolino, S D'Antonio, V Formicola… - Journal of Systems …, 2016 - Elsevier
Abstract Security Information and Event Management (SIEM) is a consolidated technology
that relies on the correlation of massive amounts of security-relevant information in order to …

Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks

AA Ramaki, A Ghaemi-Bafghi… - arxiv preprint arxiv …, 2021 - arxiv.org
Nowadays, targeted attacks like Advanced Persistent Threats (APTs) has become one of the
major concern of many enterprise networks. As a common approach to counter these …

Protecting grids from cross-domain attacks using security alert sharing mechanisms

RH Syed, M Syrame, J Bourgeois - Future Generation Computer Systems, 2013 - Elsevier
In single administrative domain networks there is only one security policy which can be
evaluated by the IT security manager, thanks to monitoring and reporting tools. Grid …

Building blocks of incident response: Security operation centers

MTA Tashfeen - AIP Conference Proceedings, 2023 - pubs.aip.org
Sophisticated adversaries can establish footprints in the enterprise systems. Consolidation
of incident response functions of monitoring, detection, malware hunting, and operation is …

SecQSON: Secure Query Scheduling and Ontology-Based Searching in Map-Evaluate-Reduce-Enabled Grid Environment

N Nalini, GM Kiran - International Conference on Emerging Research in …, 2023 - Springer
Task scheduling and resource allocation are the major issues in grid environment. Based on
grid user's requirements such as deadline, cost, and service type, tasks must be scheduled …

Detection of Distributed Attacks in Hybrid & Public Cloud Networks

SR Hassan, J Bourgeois, V Sunderam… - … , Knowledge and Grids, 2012 - ieeexplore.ieee.org
In this paper early detection of distributed attacks are discussed that are launched from
multiple sites of the hybrid & public cloud networks. A prototype of Cloud Distributed …

Deep learning and isolation based security for intrusion detection and prevention in grid computing

A Gómez Ramírez - 2018 - cds.cern.ch
The use of distributed computational resources for the solution of scientific problems, which
require highly intensive data processing is a fundamental mechanism for modern scientific …

[PDF][PDF] Міністерство освіти і науки України

З УКЛАДІВ - 2017 - core.ac.uk
УДК 330.341: 332.142 УКПП № держреєстрації 0115U000687 Інв. № Міністерство освіти
Page 1 1 УДК 330.341: 332.142 УКПП № держреєстрації 0115U000687 Інв. № Міністерство …

[ЦИТИРОВАНИЕ][C] 面向信息栅格的 DDoS 协同防御系统设计

危美林, 张明清, 唐俊, 孔红山 - 信息工程大学学报, 2015