Zobrazeno 1 - 10
of 55
pro vyhledávání: '"Gros, Stjepan"'
Firewalls are security devices that perform network traffic filtering. They are ubiquitous in the industry and are a common method used to enforce organizational security policy. Security policy is specified on a high level of abstraction, with state
Externí odkaz:
http://arxiv.org/abs/2212.03645
Publikováno v:
IEEE Access (2022)
Information technology system (ITS), informally, consists of hardware and software infrastructure (e.g., workstations, servers, laptops, installed software packages, databases, LANs, firewalls, etc.), along with physical and logical connections and i
Externí odkaz:
http://arxiv.org/abs/2107.11102
Autor:
Gernhardt, Dalibor, Groš, Stjepan
Most publicly available data on cyber incidents comes from private companies and non-academic sources. Common sources of information include various security bulletins, white papers, reports, court cases, and blog posts describing specific events, of
Externí odkaz:
http://arxiv.org/abs/2106.06000
Autor:
Groš, Stjepan
This paper is based on a three year project during which we studied attackers' behavior, reading military planning literature, and thinking on how would we do the same things they do, and what problems would we, as attackers, face. This research is s
Externí odkaz:
http://arxiv.org/abs/2106.05702
Controlled Update of Software Components using Concurrent Exection of Patched and Unpatched Versions
Software patching is a common method of removing vulnerabilities in software components to make IT systems more secure. However, there are many cases where software patching is not possible due to the critical nature of the application, especially wh
Externí odkaz:
http://arxiv.org/abs/2106.01154
Autor:
Groš, Stjepan
Cyber threat intelligence is a relatively new field that has grown from two distinct fields, cyber security and intelligence. As such, it draws knowledge from and mixes the two fields. Yet, looking into current scientific research on cyber threat int
Externí odkaz:
http://arxiv.org/abs/2001.06616
Autor:
Groš, Stjepan
CIS Controls is a set of 20 controls and 171 sub-controls that were created with an idea of having a list of something to implement so that organizations can increase their security. While good in theory, it is a big question of how viable this appro
Externí odkaz:
http://arxiv.org/abs/1910.01721
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.