Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within an IS to model security information and User Behavioral analysis. The results of the performed experiments on real data show that the modeling is ...
Information systems security is a challenging research area in the context of Information Systems. I...
The security of systems and networks is a multidisciplinary challenge of increasingly importance wh...
The exponential growth in the interconnectedness of people and devices, as well as the upward trend ...
Cyber criminality activities are changing and becoming more and more professional. With the growth o...
Logical analysis of the ontology of digital security in banking helps us to identify the possible en...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
While the recent advances in Data Science and Machine Learning attract lots of attention in Cyber Se...
With ubiquitous computing becoming pervasive in every aspect of societies around the world and the e...
“Information is the lifeblood of any organisation and everything an organisation does involves using...
Information security is plagued with increasingly sophisticated and persistent threats to communicat...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to serious operation...
The integration of networks within an organization made many critical infrastructures (CI) and their...
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...
The insider threat ranks among the most pressing cyber-security challengesthat threaten government a...
AbstractInformation security is the most challenging aspect of information processing. Organizations...
Information systems security is a challenging research area in the context of Information Systems. I...
The security of systems and networks is a multidisciplinary challenge of increasingly importance wh...
The exponential growth in the interconnectedness of people and devices, as well as the upward trend ...
Cyber criminality activities are changing and becoming more and more professional. With the growth o...
Logical analysis of the ontology of digital security in banking helps us to identify the possible en...
Obtaining trustworthy estimates for the reliability and security of corporate information systems is...
While the recent advances in Data Science and Machine Learning attract lots of attention in Cyber Se...
With ubiquitous computing becoming pervasive in every aspect of societies around the world and the e...
“Information is the lifeblood of any organisation and everything an organisation does involves using...
Information security is plagued with increasingly sophisticated and persistent threats to communicat...
Cyber-attacks can significantly hurt an organization’s IT environment, leading to serious operation...
The integration of networks within an organization made many critical infrastructures (CI) and their...
14 pages ; Session 4: PrivacyInternational audienceAmong the issues the information system security ...
The insider threat ranks among the most pressing cyber-security challengesthat threaten government a...
AbstractInformation security is the most challenging aspect of information processing. Organizations...
Information systems security is a challenging research area in the context of Information Systems. I...
The security of systems and networks is a multidisciplinary challenge of increasingly importance wh...
The exponential growth in the interconnectedness of people and devices, as well as the upward trend ...