Zobrazeno 1 - 10
of 1 705
pro vyhledávání: '"incident response"'
Autor:
D. A. Evdokimova, A. A. Mikryukov
Publikováno v:
Открытое образование (Москва), Vol 28, Iss 4, Pp 33-42 (2024)
The purpose of the study is to develop an approach for identifying and processing invalid events in critical information infrastructure (CII) based on the concepts of taxonomy and categorization. The approach aims to improve the efficiency of identif
Externí odkaz:
https://doaj.org/article/d66deb3a41ed4a23ae364547a061cee6
Autor:
Ali Abuabid, Abdulrahman Aldeij
Publikováno v:
Journal of Information Security and Cybercrimes Research, Vol 7, Iss 1, Pp 29-50 (2024)
In response to the growing cyber-attack threat, incident response teams have become a critical component of an organization's cybersecurity strategy. These teams are responsible for detecting, analyzing, and responding to security incidents promptly
Externí odkaz:
https://doaj.org/article/7abada7f41e2421493c02fb846a589d0
Publikováno v:
Frontiers in Bioengineering and Biotechnology, Vol 12 (2024)
The rapid advancement of biological research and biotechnology requires a novel and robust regulatory agency to ensure uniform biosafety and biosecurity governance in the United States. The current fragmented regulatory landscape needs to be refocuse
Externí odkaz:
https://doaj.org/article/e4fbfc17782849aab45b056e77b54943
Autor:
Auzina, Ieva, Volkova, Tatjana, Norena-Chavez, Diego, Kadłubek, Marta, Thalassinos, Eleftherios
Publikováno v:
Digital Transformation, Strategic Resilience, Cyber Security and Risk Management
Publikováno v:
Information & Computer Security, 2023, Vol. 31, Issue 4, pp. 404-426.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-05-2022-0085
Publikováno v:
European Transport Research Review, Vol 16, Iss 1, Pp 1-12 (2024)
Abstract Motorway incidents are frequent & varied in nature. Incident management on motorways is critical for both driver safety & road network operation. The expected duration of an incident is a key parameter in the decision-making process for cont
Externí odkaz:
https://doaj.org/article/9d146c04fd96451190a1905e7bcb1c57
Publikováno v:
IEEE Access, Vol 12, Pp 123811-123822 (2024)
This study explores how integrating Artificial General Intelligence (AGI) with Artificial Immune Systems (AIS) could potentialy enhance the efficiency of Security Operations Centers (SOCs). By employing a hypothetical case study and mathematical mode
Externí odkaz:
https://doaj.org/article/2247f79ee9c64ac9a4a00014ff275add
Autor:
Yuuki Tsubouchi, Hirofumi Tsuruta
Publikováno v:
IEEE Access, Vol 12, Pp 37398-37417 (2024)
Automated fault localization in large-scale cloud-based applications is challenging because it involves mining multivariate time series data from large volumes of operational monitoring metrics. To improve localization accuracy, automated fault local
Externí odkaz:
https://doaj.org/article/0fec4f42f1ab4d6da4c91f30aa8f71cf
Autor:
Olufunsho I. Falowo, Jacques Bou Abdo
Publikováno v:
IEEE Access, Vol 12, Pp 26759-26772 (2024)
This comprehensive study investigates the trends, impacts, and global distribution of major Distributed Denial of Service (DDoS) attacks from 2019 to 2023, aiming to understand their evolution and predict future trends. Over the past five years, we h
Externí odkaz:
https://doaj.org/article/85d17b7b52d7431c8b953688b0697c91
Autor:
Masike Malatji, Walter Matli
Publikováno v:
Journal of Information Security and Cybercrimes Research, Vol 6, Iss 2, Pp 116-129 (2023)
The Brazil, Russia, India, China, South Africa (BRICS) nations lack a cohesive cybersecurity framework for intelligence exchange. The proposed expansion of the BRICS bloc calls for a BRICS+ agency dedicated to cybersecurity information sharing and an
Externí odkaz:
https://doaj.org/article/ec2d237d0eab436da775b0a0b597ef84