Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Supporting continuous vulnerability compliance through automated identity provisioning
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 101–110https://doi.org/10.1145/3697090.3697098Most applications will exhibit vulnerabilities that impact their availability, integrity, or confidentiality during their life cycle. Nevertheless, the leading cause for such vulnerabilities is not the application itself but its dependencies. Continuous ...
- research-articleOctober 2024
The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 3Article No.: 28, Pages 1–24https://doi.org/10.1145/3688808This article addresses the significant threat posed by rootkits as part of the diverse malware landscape of today. Rootkits enable an attacker to regain access to an already comprised system at root-level making their prompt identification and removal ...
- research-articleJanuary 2025
Assessing the Frontiers of SIEM Technology: A Rigorous Evaluation and Validation of Innovative Features in SIEM Solutions
ITCC '24: Proceeding of the 2024 6th International Conference on Information Technology and Computer CommunicationsPages 21–29https://doi.org/10.1145/3704391.3704395Security Information and Event Management (SIEM) systems play a crucial role in modern cybersecurity by aggregating, correlating, and analyzing vast amounts of security data. As cyber threats continue to evolve, the demand for Next-Generation SIEMs (NG-...
- research-articleJuly 2024
SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE
- Panagiotis Bountakas,
- Konstantinos Fysarakis,
- Thomas Kyriakakis,
- Panagiotis Karafotis,
- Sotiropoulos Aristeidis,
- Maria Tasouli,
- Cristina Alcaraz,
- George Alexandris,
- Vassiliki Andronikou,
- Tzortzia Koutsouri,
- Romarick Yatagha,
- George Spanoudakis,
- Sotiris Ioannidis,
- Fabio Martinelli,
- Oleg Illiashenko
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 128, Pages 1–10https://doi.org/10.1145/3664476.3669924In an era of escalating cyber threats, the imperative for robust and comprehensive cybersecurity measures has never been more pressing. To address this challenge, SYNAPSE presents a pioneering approach by conceptualising, designing, and delivering an ...
- posterMarch 2024
An attempts to improve security on campus
SIGUCCS '24: Proceedings of the 2024 ACM SIGUCCS Annual ConferencePages 52–56https://doi.org/10.1145/3599732.3641328The methods of cyberattacks are diversifying year by year, making it difficult to detect attacks.
At our university, we use IDS/IPS to detect attacks from the outside and suspicious communications from the inside to the outside. In addition, we used a ...
-
- articleApril 2024
Predicting and Visualizing Lateral Movements Based on ATT&CK and Quantification Theory Type 3
Journal of Cases on Information Technology (JCIT-IGI), Volume 26, Issue 1Pages 1–14https://doi.org/10.4018/JCIT.340722When a cyber incident occurs, organizations need to identify the attack's impacts. They have to investigate potentially infected devices as well as certainly infected devices. However, as an organization's network expands, it is difficult to investigate ...
- research-articleOctober 2023
security.txt Revisited: Analysis of Prevalence and Conformity in 2022
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 3Article No.: 36, Pages 1–17https://doi.org/10.1145/3609234Determining the correct contact person for a particular system or organization is challenging in today’s Internet architecture. However, there are various stakeholders who will need to have such information, such as national security teams, security ...
- research-articleJune 2023
Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks
EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity ConferencePages 92–99https://doi.org/10.1145/3590777.3590792As malware continues to evolve, deep learning models are increasingly used for malware detection and classification, including image-based classification. However, adversarial attacks can be used to perturb images so as to evade detection by these ...
- research-articleJune 2023
Integrated cybersecurity methodology and supporting tools for healthcare operational information systems
Highlights- Cyber.SCuris integrating cybersecurity methodology and technological artifacts.
- Integration of Healthcare Security Monitoring System functions.
- Use case of health information system university medical center.
- Cybersecurity ...
The recent increase in cybersecurity threats and cyberattacks impact organizations at various levels, including business-critical processes, and compromises business continuation and organizations survival. The cybersecurity of the healthcare ...
- research-articleAugust 2022
SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 25, Pages 1–10https://doi.org/10.1145/3538969.3538981Incident handling, a fundamental activity of a cybersecurity incident response team, is a complex discipline that consumes a significant amount of personnel’s time and costs. There are continuous efforts to facilitate incident handling and response in ...
- research-articleAugust 2022
Model-Based Incident Response Playbooks
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 26, Pages 1–7https://doi.org/10.1145/3538969.3538976Inevitably, all systems are vulnerable, and none are impervious to attack. Incident response is an important element in maintaining the cyber security posture of organizations. Incident response practitioners often rely on process descriptions in the ...
- research-articleAugust 2022
SOAR4IoT: Securing IoT Assets with Digital Twins
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 4, Pages 1–10https://doi.org/10.1145/3538969.3538975As more and more security tools provide organizations with cybersecurity capabilities, security analysts are overwhelmed by security events. Resolving these events is challenging due to extensive manual processes, limited financial resources, and human ...
- research-articleFebruary 2022
Agile incident response (AIR): Improving the incident response process in healthcare
International Journal of Information Management: The Journal for Information Professionals (IJIM), Volume 62, Issue Chttps://doi.org/10.1016/j.ijinfomgt.2021.102435AbstractRecent industrial reports show an increased number of cybersecurity incidents, which inflict significant financial losses. Although organisations have been increasing their investments towards information security, incidents continue ...
Highlights- Linear IR models are inefficient in responding to the changing threat landscapes.
- articleSeptember 2021
Designing and Evaluating an Automatic Forensic Model for Fast Response of Cross-Border E-Commerce Security Incidents
Journal of Global Information Management (JGIM), Volume 30, Issue 2Pages 1–19https://doi.org/10.4018/JGIM.20220301.oa5The rapid development of cross-border e-commerce over the past decade has accelerated the integration of the global economy. At the same time, cross-border e-commerce has increased the prevalence of cybercrime, and the future success of e-commerce ...
- research-articleAugust 2021
System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityArticle No.: 112, Pages 1–8https://doi.org/10.1145/3465481.3470037In this paper, we describe a system for the continuous collection of data for the needs of network security management. When a cybersecurity incident occurs in the network, the contextual information on the involved assets facilitates estimating the ...
- research-articleSeptember 2020
What happens in a control room during a cybersecurity attack?: Preliminary observations from a pilot study
ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering WorkshopsPages 270–275https://doi.org/10.1145/3387940.3391454Cyberattacks on the critical infrastructure is a growing concern for businesses, national authorities and public in general. The increasing complexity and connectivity of the critical infrastructure systems have made them susceptible to cyberattacks. ...
- short-paperAugust 2019
Enhancing credibility of digital evidence through provenance-based incident response handling
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and SecurityArticle No.: 26, Pages 1–6https://doi.org/10.1145/3339252.3339275Digital forensics are becoming increasingly important for the investigation of computer-related crimes, white-collar crimes and massive hacker attacks. After an incident has been detected an appropriate incident response is usually initiated with the ...
- articleJuly 2017
Socio-Technical SIEM ST-SIEM: Towards Bridging the Gap in Security Incident Response
International Journal of Systems and Society (IJSS-IGI), Volume 4, Issue 2Pages 8–21https://doi.org/10.4018/IJSS.2017070102This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System ST-SIEM. This newly-developed artifact addresses an important limitation identified in today incident response practice-the lack ...
- ArticleAugust 2015
Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud
IRI '15: Proceedings of the 2015 IEEE International Conference on Information Reuse and IntegrationPages 419–426https://doi.org/10.1109/IRI.2015.71Community clouds provide efficient and secure environments for organizations with similar organization structures or business models to host their systems. Since threat analysis and incident response infrastructure and resources can be rapidly shared on ...
- tutorialOctober 2013
The Role of the User in Social Media Incident Response
InfoSecCD '13: Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development ConferencePages 60–64https://doi.org/10.1145/2528908.2528916The landscape for Incident Response (IR), Disaster Recovery (DR), and Business Continuity Planning (BCP) for social media is changing and growing as the growth of social media itself is just now reaching puberty. An examination of responses by companies ...