Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Bernhards Blumbergs"'
Autor:
Austris Uljāns, Bernhards Blumbergs
Publikováno v:
Proceedings of the 8th International Conference on Information Systems Security and Privacy.
Autor:
Bernhards Blumbergs, Ēriks Dobelis, Pēteris Paikens, Krišjānis Nesenbergs, Kirils Solovjovs, Artis Rušiņš
Publikováno v:
Secure IT Systems ISBN: 9783031222948
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a015ca5f865669ed492dcc1ee64e3a8
https://doi.org/10.1007/978-3-031-22295-5_17
https://doi.org/10.1007/978-3-031-22295-5_17
Publikováno v:
NOMS
System logs provide valuable information about the health status of IT systems and computer networks. Therefore, log file monitoring has been identified as an important system and network management technique. While many solutions have been developed
Publikováno v:
MILCOM
Cyber Defense Exercises have received much attention in recent years, and are increasingly becoming the cornerstone for ensuring readiness in this new domain. Crossed Swords is an exercise directed at training Red Team members for responsive cyber de
Autor:
Risto Vaarandi, Bernhards Blumbergs
Publikováno v:
MILCOM
Fuzzing is a critical part of secure software development life-cycle, for finding vulnerabilities, developing exploits, and reverse engineering. This relies on appropriate approaches, tools and frameworks. File and protocol fuzzing is well covered, m
A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks
Publikováno v:
2017 International Conference On Cyber Incident Response, Coordination, Containment & Control (Cyber Incident).
Traditional defences such as intrusion detection systems, firewalls and antivirus software are not enough to prevent security breaches caused by highly targeted cyber threats. As many of these attacks go undetected, this paper shows the results of a
Publikováno v:
Secure IT Systems ISBN: 9783319475592
NordSec
NordSec
The Internet Protocol Version 6 (IPv6) transition opens a wide scope for potential attack vectors. IPv6 transition mechanisms could allow the set-up of covert egress communication channels over an IPv4-only or dual-stack network, resulting in full co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c2617ef95ef7bed9fe77c1477e5ebf1d
https://doi.org/10.1007/978-3-319-47560-8_6
https://doi.org/10.1007/978-3-319-47560-8_6
Publikováno v:
CogSIMA
During the past two decades, event correlation has emerged as a prominent monitoring technique, and is essential for achieving better situational awareness. Since its introduction in 2001 by one of the authors of this paper, Simple Event Correlator (
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d055776706dc89fda77a70aa2de14208
https://aperta.ulakbim.gov.tr/record/100599
https://aperta.ulakbim.gov.tr/record/100599
Autor:
Bernhards Blumbergs
Publikováno v:
Scopus-Elsevier
ICISSP
ICISSP
Cyber red teaming and its techniques, tactics and procedures have to be constantly developed to identify, counter and respond to sophisticated threats targeting critical infrastructures. This paper focuses on cyber red team technical arsenal developm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::baa9cf9b156da2c7a2bea02cabcde9fb
http://www.scopus.com/inward/record.url?eid=2-s2.0-85064619226&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85064619226&partnerID=MN8TOARS
Autor:
Bernhards Blumbergs, Daniele Mucci
Publikováno v:
Scopus-Elsevier
ICISSP
ICISSP
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5892bc948cf1211f64f426b09488a7ca
http://www.scopus.com/inward/record.url?eid=2-s2.0-85064639859&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-85064639859&partnerID=MN8TOARS