Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Leonard Renners"'
Publikováno v:
International Journal on Cyber Situational Awareness. 4:99-127
Publikováno v:
ICDIS
Network security tools like Security Information and Event Management systems detect and process incidents with respect to the network and environment they occur in. Part of the analysis is used to estimate a priority for the incident to effectively
Publikováno v:
Cyber Security
Incident prioritization is nowadays a part of many approaches and tools for network security and risk management. However, the dynamic nature of the problem domain is often unaccounted for. That is, the prioritization is typically based on a set of s
Publikováno v:
IDAACS
With the ever rising amount of security and alert information, the decision process which incident to address first becomes increasingly important and prioritizing incidents is a common approach towards this problem. Meanwhile, networks and policies
Autor:
Volker Ahlers, Bastian Hellmann, Felix Heine, Carsten Kleiner, Thomas Rossow, Ralf Steuerwald, Leonard Renners
Publikováno v:
Graphical Models for Security ISBN: 9783319299679
GraMSec@CSF
GraMSec@CSF
In computer networks many components produce valuable information about themselves or other participants, especially security analysis relevant information. Although such information is intrinsically related as components are connected by a network,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::45a738b997258862e6dae092783eae97
https://doi.org/10.1007/978-3-319-29968-6_2
https://doi.org/10.1007/978-3-319-29968-6_2
Publikováno v:
IDAACS
The threat of cyber-attacks grows up, as one can see by several negative security-news from companies and private persons. [7] Especially small-and-medium-sized enterprises (SME) are in focus of external attackers because they have not implemented su
Autor:
Ahlers, Volker, Heine, Felix, Hellmann, Bastian, Kleiner, Carsten, Renners, Leonard, Rossow, Thomas, Steuerwald, Ralf
Publikováno v:
Graphical Models for Security; 2016, p18-34, 17p
Publikováno v:
Graphical Models for Security; 2016, pI-IX, 9p
Publikováno v:
2015 IEEE 8th International Conference on Intelligent Data Acquisition & Advanced Computing Systems: Technology & Applications (IDAACS); 2015, p322-327, 6p
Publikováno v:
2015 IEEE 8th International Conference on Intelligent Data Acquisition & Advanced Computing Systems: Technology & Applications (IDAACS); 2015, pxi-xxiv, 14p