The timely and reliable data transfer required by many networked applications necessitates the development of comprehensive security solutions to monitor and protect against an increasing number of malicious attacks. However, providing complete cyber space situation awareness is extremely challenging because of the lack of effective translation mechanisms from low-level situation information to high-level human cognition for decision making and action support. We propose an adaptive cyber security monitoring system that integrates a number of component techniques to collect timeseries situation information, perform intrusion detection, keep track of event evolution, characterize and identify security events, and present a visual representat...
International audienceThe paper studies the process of correlation for SIEM systems based on analyzi...
konstanz.de Monitoring computer networks often includes gathering vast amounts of time-series data f...
International audienceWith the increasing number of connected devices and given the complexity of co...
The timely and reliable data transfer required by many networked applications necessitates the devel...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
Abstract—Detecting and identifying security events to provide cyber situation awareness has become a...
More than ever, we rely on computer systems and the availability of computer networks. It is crucial...
Effective visual analysis of computer network defense (CND) information is challenging due to the vo...
Network security manager are faced with a rapidly changing and complex threat environment due to the...
When a cyber-security event occurs, a person has to answer the following questions: what events are ...
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in c...
Efficient visualization of cyber incidents is the key in securing increasingly complex information i...
Traditional risk management produces a rather static listing of weaknesses, probabilities and mitiga...
International audienceThe paper studies the process of correlation for SIEM systems based on analyzi...
konstanz.de Monitoring computer networks often includes gathering vast amounts of time-series data f...
International audienceWith the increasing number of connected devices and given the complexity of co...
The timely and reliable data transfer required by many networked applications necessitates the devel...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
Abstract—Detecting and identifying security events to provide cyber situation awareness has become a...
More than ever, we rely on computer systems and the availability of computer networks. It is crucial...
Effective visual analysis of computer network defense (CND) information is challenging due to the vo...
Network security manager are faced with a rapidly changing and complex threat environment due to the...
When a cyber-security event occurs, a person has to answer the following questions: what events are ...
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in c...
Efficient visualization of cyber incidents is the key in securing increasingly complex information i...
Traditional risk management produces a rather static listing of weaknesses, probabilities and mitiga...
International audienceThe paper studies the process of correlation for SIEM systems based on analyzi...
konstanz.de Monitoring computer networks often includes gathering vast amounts of time-series data f...
International audienceWith the increasing number of connected devices and given the complexity of co...