Howes et al., 2013 - Google Patents
Enabling trustworthy spaces via orchestrated analytical securityHowes et al., 2013
View PDF- Document ID
- 5826350739470193488
- Author
- Howes J
- Solderitsch J
- Chen I
- Craighead J
- Publication year
- Publication venue
- Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
External Links
Snippet
Cyberspaces require both the implementation of customized functional requirements and the enforcement of policy constraints to be trustworthy. In tailored, distributed and adaptive environments (spaces), monitoring to ensure this enforcement is especially difficult given the …
- 238000004458 analytical method 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Pandey et al. | Cyber security risks in globalized supply chains: conceptual framework | |
| Yeboah-Ofori et al. | Cyber threat predictive analytics for improving cyber supply chain security | |
| Naseer et al. | Demystifying analytical information processing capability: The case of cybersecurity incident response | |
| Alani | Big data in cybersecurity: a survey of applications and future trends | |
| Cristea | Current security threats in the national and international context | |
| Madhavram et al. | AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance | |
| Yusop et al. | Analysis of insiders attack mitigation strategies | |
| Eastman et al. | Big data and predictive analytics: on the cybersecurity front line | |
| Mahmud et al. | AI-Driven Cybersecurity in IT Project Management: Enhancing Threat Detection and Risk Mitigation | |
| Garvey et al. | Analytical frameworks to assess the effectiveness and economic-returns of cybersecurity investments | |
| Galla et al. | AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance | |
| Waelchli et al. | Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study | |
| Kommaragiri | Enhancing Telecom Security Through Big Data Analytics and Cloud-Based Threat Intelligence | |
| Susanto et al. | Information security awareness within business environment: an IT review | |
| Akhtar | Artificial intelligence (AI) within the realm of cyber security | |
| Yıldız et al. | Cyber-physical systems and cyber security: a bibliometric analysis | |
| Howes et al. | Enabling trustworthy spaces via orchestrated analytical security | |
| Flynn et al. | Cloud service provider methods for managing insider threats: Analysis phase 2, expanded analysis and recommendations | |
| Albanese et al. | Formation of awareness | |
| Ahmad et al. | Situation-awareness in incident response: an in-depth case study and process model | |
| Babatunde et al. | Adversarial machine learning in cybersecurity: Vulnerabilities and defense strategies | |
| Cinar | A Study on Cyber Threat Intelligence Based on Current Trends and Future Perspectives | |
| Wendt | AI for Defense | |
| Machim et al. | Guidelines for the protection of computer crime threats in the industrial business | |
| Lier et al. | An iterative five-phase process model to successfully implement AI for cybersecurity in a corporate environment |