International audienceOver the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them. This complex landscape has made it extremely difficult for security administrators to keep accurate and be effective in protecting their systems against cyber threats. In this paper, we describe our vision and scientific posture on how artificial intelligence techniques and a smart use of security knowledge may assist system administrators in better defending their networks. To that end, we put forward a research roadmap involving three complimentary axes, namely, (I) the use of FCA-based mechanisms for managing configuration...
The increase in cyber-attacks impacts the performance of organizations in the industrial sector, exp...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods ...
International audienceOver the last years, computer networks have evolved into highly dynamic and in...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
This paper presents an in-depth exploration of the application of Artificial Intelligence (AI), spec...
As a result of the expansion of the internet of things and linked devices, professionals in the fiel...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
Due to the expansion of the internet of things and connected devices, cyber security professionals i...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
In this work we go beyond what is called unsupervised learning, a decision- -making method that resu...
Cyberwarfare has become an important concern for governmental agencies as well businesses of various...
The increase in cyber-attacks impacts the performance of organizations in the industrial sector, exp...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods ...
International audienceOver the last years, computer networks have evolved into highly dynamic and in...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
This paper presents an in-depth exploration of the application of Artificial Intelligence (AI), spec...
As a result of the expansion of the internet of things and linked devices, professionals in the fiel...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
Due to the expansion of the internet of things and connected devices, cyber security professionals i...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
In this work we go beyond what is called unsupervised learning, a decision- -making method that resu...
Cyberwarfare has become an important concern for governmental agencies as well businesses of various...
The increase in cyber-attacks impacts the performance of organizations in the industrial sector, exp...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods ...