Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Norem, Savannah"'
Autor:
Bridges, Robert A., Weber, Brian, Beaver, Justin M., Smith, Jared M., Verma, Miki E., Norem, Savannah, Spakes, Kevin, Watson, Cory, Nichols, Jeff A., Jewell, Brian, Iannacone, Michael. D., Stahl, Chelsey Dunivan, Huffer, Kelly M. T., Oesch, T. Sean
This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intell
Externí odkaz:
http://arxiv.org/abs/2308.14835
Autor:
Bridges, Robert A., Rice, Ashley E., Oesch, Sean, Nichols, Jeff A., Watson, Cory, Spakes, Kevin, Norem, Savannah, Huettel, Mike, Jewell, Brian, Weber, Brian, Gannon, Connor, Bizovi, Olivia, Hollifield, Samuel C, Erwin, Samantha
Publikováno v:
Computers & Security 2023
Modern security operation centers (SOCs) rely on operators and a tapestry of logging and alerting tools with large scale collection and query abilities. SOC investigations are tedious as they rely on manual efforts to query diverse data sources, over
Externí odkaz:
http://arxiv.org/abs/2208.06075
Autor:
Norem, Savannah, Rice, Ashley E, Erwin, Samantha, Bridges, Robert A, Oesch, Sean, Weber, Brian
Security operation centers (SOCs) all over the world are tasked with reacting to cybersecurity alerts ranging in severity. Security Orchestration, Automation, and Response (SOAR) tools streamline cybersecurity alert responses by SOC operators. SOAR t
Externí odkaz:
http://arxiv.org/abs/2112.00100
Autor:
Bridges, Robert A., Rice, Ashley E., Oesch, Sean, Nichols, Jeffrey. A., Watson, Cory, Spakes, Kevin, Norem, Savannah, Huettel, Mike, Jewell, Brian, Weber, Brian, Gannon, Connor, Bizovi, Olivia, Hollifield, Samuel C., Erwin, Samantha
Publikováno v:
In Computers & Security June 2023 129
Autor:
Sokratis Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, Weizhi Meng, Steven Furnell, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge
This book constitutes the refereed proceedings of six International Workshops that were held in conjunction with the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-6, 2021. The conference was