Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Florian Menges"'
Publikováno v:
Cybersecurity, Vol 2, Iss 1, Pp 1-15 (2019)
Abstract Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful atta
Externí odkaz:
https://doaj.org/article/92e02c947260486fb0770df0bad1c294
Publikováno v:
Cybersecurity, Vol 1, Iss 1, Pp 1-19 (2018)
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in cooperative approaches to encounter cyber threats. To enable cooperation in detecting and preventing attacks it is an inevitable necessity to have stru
Externí odkaz:
https://doaj.org/article/cd1a5510aeb649b2b3cbef687fd74246
Publikováno v:
Cybersecurity, Vol 2, Iss 1, Pp 1-1 (2019)
In the original publication of this article (Vielberth et al. 2019), the author list was not completed.
Externí odkaz:
https://doaj.org/article/6d0a9c5a52e843a8af2c46e6e64ff718
Publikováno v:
Lecture Notes in Computer Science
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec)
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.64-76, ⟨10.1007/978-3-030-49669-2_4⟩
Data and Applications Security and Privacy XXXIV ISBN: 9783030496685
DBSec
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec)
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.64-76, ⟨10.1007/978-3-030-49669-2_4⟩
Data and Applications Security and Privacy XXXIV ISBN: 9783030496685
DBSec
Part 1: Network and Cyber-Physical Systems Security; International audience; Enumerations constitute a pivotal element of Cyber Threat Intelligence (CTI). References to enumerated artifacts support a universal understanding and integrate threat infor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8d5f092a51610c1ed02883f69a76c1ae
https://hal.inria.fr/hal-03243630
https://hal.inria.fr/hal-03243630
The exchange of threat intelligence information can make a significant contribution to improving IT security in companies and has become increasingly important in recent years. However, such an exchange also entails costs and risks, preventing many c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cbcd9e7c9f0c36b6eb095d9e05432c9f
Autor:
Günther Pernul, Florian Menges
Publikováno v:
Computers & Security. 73:87-101
Over the past few years, the number of attacks against IT systems and the resulting incidents has steadily increased. To protect against these attacks, joint approaches, which include the sharing of incident information, are increasingly gaining in i
Publikováno v:
Cybersecurity, Vol 2, Iss 1, Pp 1-1 (2019)
In the original publication of this article (Vielberth et al. 2019), the author list was not completed.
Publikováno v:
Trust, Privacy and Security in Digital Business ISBN: 9783030278120
TrustBus
TrustBus
The threat landscape and the associated number of IT security incidents are constantly increasing. In order to address this problem, a trend towards cooperative approaches and the exchange of information on security incidents has been developing over
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dbfd4874335628c186b9a5ebb9ccbebc
https://epub.uni-regensburg.de/40699/
https://epub.uni-regensburg.de/40699/
Publikováno v:
Cybersecurity, Vol 1, Iss 1, Pp 1-19 (2018)
The ever-increasing amount of major security incidents has led to an emerging interest in cooperative approaches to encounter cyber threats. To enable cooperation in detecting and preventing attacks it is an inevitable necessity to have structured an
Autor:
Benjamin Taubmann, Johannes Köstler, Tobias Latzo, Sabine Sobola, Günther Pernul, Manfred Vielberth, Henrich C. Pöhls, Alexander Puchta, Hans P. Reiser, Felix C. Freiling, Florian Menges
Publikováno v:
Computers & Security. 103:102165
The introduction of the General Data Protection Regulation (GDPR) in Europe raises a whole series of issues and implications on the handling of corporate data. We consider the case of security-relevant data analyses in companies, such as those carrie