Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Pavol Sokol"'
Publikováno v:
Data in Brief, Vol 55, Iss , Pp 110693- (2024)
The dataset consists of records from the NTFS file system and event logs. In this study, we used images of devices from capture the flags competitions focused on the digital forensic of Windows operating systems and user activities. We created timeli
Externí odkaz:
https://doaj.org/article/0eaceb1729e84fa781ce1d271b5035e8
Publikováno v:
Journal of Universal Computer Science, Vol 25, Iss 11, Pp 1417-1436 (2019)
With the number of Internet of Things devices increasing, also the number of vulnerable devices connected to the Internet increases. These devices can become part of botnets and cause damage to the Internet infrastructure. In this paper we study teln
Externí odkaz:
https://doaj.org/article/dfd5a25e7267417db91cf0d165f5dd6b
Publikováno v:
Data in Brief, Vol 33, Iss , Pp 106530- (2020)
The dataset contains intrusion detection alerts obtained via an alert sharing platform (SABU) for one week. A plethora of heterogeneous intrusion detection systems deployed across several organizations contributed to the sharing platform. The alerts
Externí odkaz:
https://doaj.org/article/90c998ec00f34f4fab6d3a9574581e01
Publikováno v:
Information, Vol 11, Iss 12, p 560 (2020)
Nowadays, systems around the world face many cyber attacks every day. These attacks consist of numerous steps that may occur over an extended period of time. We can learn from them and use this knowledge to create tools to predict and prevent the att
Externí odkaz:
https://doaj.org/article/af95613055b9461eb9f0b370399825ae
Publikováno v:
Information, Vol 11, Iss 11, p 537 (2020)
The rapid move to digitalization and usage of online information systems brings new and evolving threats that organizations must protect themselves from and respond to. Monitoring an organization’s network for malicious activity has become a standa
Externí odkaz:
https://doaj.org/article/1f1bde886a13434dae307150f0c328de
Publikováno v:
Logic Journal of the IGPL. 31:352-374
The usage of new and progressive technologies brings with it new types of security threats and security incidents. Their number is constantly growing.The current trend is to move from reactive to proactive activities. For this reason, the organizatio
Publikováno v:
Contributions to Statistics ISBN: 9783031141966
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7db42f4ff208d004a008a2a5246faf89
https://doi.org/10.1007/978-3-031-14197-3_17
https://doi.org/10.1007/978-3-031-14197-3_17
Publikováno v:
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
Publikováno v:
Future Generation Computer Systems
Predictive analysis allows next-generation cyber defense that is more proactive than current approaches based on intrusion detection. In this paper, we discuss various aspects of predictive methods in cyber defense and illustrate them on three exampl
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030903206
Lecture Notes in Networks and Systems
Lecture Notes in Networks and Systems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3857e93c0a0752ec31fba556e2068db0
https://doi.org/10.1007/978-3-030-90321-3_65
https://doi.org/10.1007/978-3-030-90321-3_65