+

Howes et al., 2013 - Google Patents

Enabling trustworthy spaces via orchestrated analytical security

Howes et al., 2013

View PDF
Document ID
5826350739470193488
Author
Howes J
Solderitsch J
Chen I
Craighead J
Publication year
Publication venue
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop

External Links

Snippet

Cyberspaces require both the implementation of customized functional requirements and the enforcement of policy constraints to be trustworthy. In tailored, distributed and adaptive environments (spaces), monitoring to ensure this enforcement is especially difficult given the …
Continue reading at scholar.archive.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition

Similar Documents

Publication Publication Date Title
Pandey et al. Cyber security risks in globalized supply chains: conceptual framework
Yeboah-Ofori et al. Cyber threat predictive analytics for improving cyber supply chain security
Naseer et al. Demystifying analytical information processing capability: The case of cybersecurity incident response
Alani Big data in cybersecurity: a survey of applications and future trends
Cristea Current security threats in the national and international context
Madhavram et al. AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance
Yusop et al. Analysis of insiders attack mitigation strategies
Eastman et al. Big data and predictive analytics: on the cybersecurity front line
Mahmud et al. AI-Driven Cybersecurity in IT Project Management: Enhancing Threat Detection and Risk Mitigation
Garvey et al. Analytical frameworks to assess the effectiveness and economic-returns of cybersecurity investments
Galla et al. AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance
Waelchli et al. Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study
Kommaragiri Enhancing Telecom Security Through Big Data Analytics and Cloud-Based Threat Intelligence
Susanto et al. Information security awareness within business environment: an IT review
Akhtar Artificial intelligence (AI) within the realm of cyber security
Yıldız et al. Cyber-physical systems and cyber security: a bibliometric analysis
Howes et al. Enabling trustworthy spaces via orchestrated analytical security
Flynn et al. Cloud service provider methods for managing insider threats: Analysis phase 2, expanded analysis and recommendations
Albanese et al. Formation of awareness
Ahmad et al. Situation-awareness in incident response: an in-depth case study and process model
Babatunde et al. Adversarial machine learning in cybersecurity: Vulnerabilities and defense strategies
Cinar A Study on Cyber Threat Intelligence Based on Current Trends and Future Perspectives
Wendt AI for Defense
Machim et al. Guidelines for the protection of computer crime threats in the industrial business
Lier et al. An iterative five-phase process model to successfully implement AI for cybersecurity in a corporate environment
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载