Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Sathya Chandran Sundaramurthy"'
Publikováno v:
CCS
Android's fragmented ecosystem makes the delivery of security updates and OS upgrades cumbersome and complex. While Google initiated various projects such as Android One, Project Treble, and Project Mainline to address this problem, and other involve
Autor:
Xinming Ou, John McHugh, Alexandru G. Bardas, Michael Wesch, Sathya Chandran Sundaramurthy, S. Raj Rajagopalan
Publikováno v:
IEEE Internet Computing. :1-1
Autor:
Michael Wesch, John McHugh, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, S. Raj Rajagopalan
Publikováno v:
IEEE Internet Computing. 21:40-46
Security Operation Centers (SOCs) are being operated by universities, government agencies, and corporations to defend their enterprise networks and identify and thwart malicious behaviors in both networks and hosts. The success of a SOC depends on co
Publikováno v:
Computer Security – ESORICS 2017 ISBN: 9783319664019
ESORICS (1)
ESORICS (1)
The static nature of current IT systems gives attackers the extremely valuable advantage of time, as adversaries can take their time and plan attacks at their leisure. Although cloud infrastructures have increased the automation options for managing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::47cc15c609f4f3cc87186afe1d159bb2
https://doi.org/10.1007/978-3-319-66402-6_11
https://doi.org/10.1007/978-3-319-66402-6_11
Autor:
S. Raj Rajagopalan, John McHugh, Michael Wesch, Sathya Chandran Sundaramurthy, Xinming Simon Ou
Publikováno v:
IEEE Security & Privacy. 12:52-60
The ethnographic method of participant observation can help researchers better understand the challenges computer security incident response teams face by illuminating underlying assumptions and tacit practices that shape how tools are actually used
Publikováno v:
SIW@CCS
Security researchers have been trying to understand functioning of a security operation center (SOC) and how security analysts perform their job. This effort is motivated by the fact that security monitoring and analysis is not just a technical probl
Publikováno v:
NSPW
Current tools and solutions to handle incident response and forensics focus only on one piece of evidence, doing very little towards presenting the big picture. My PhD dissertation will focus on developing analytical tools that can automate repeated
Publikováno v:
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security.
We report preliminary results on analyzing a large dataset of over 35 billion alerts recorded over a 5 year period by Hewlett-Packard (HP) TippingPoint Intrusion Prevention System (IPS) devices located in over 1,000 customer networks worldwide. This
Publikováno v:
eCrime Researchers Summit
While most enterprise computing environments are proactively monitored for threats and security violations using automated detection engines, the ability to validate reported events as true incidents still requires a non-trivial amount of time and in
Publikováno v:
AISec
Intrusion analysis and incident management remains a difficult problem in practical network security defense. The root cause of this problem is the large rate of false positives in the sensors used by Intrusion Detection System (IDS) systems, reducin