Amthor et al., 2019 - Google Patents
Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systemsAmthor et al., 2019
- Document ID
- 15233447890281075624
- Author
- Amthor P
- Fischer D
- Kühnhauser W
- Stelzer D
- Publication year
- Publication venue
- Proceedings of the 14th International Conference on Availability, Reliability and Security
External Links
Snippet
Cyber security management requires fast and cost efficient responses to threat alerts. Automation of cyber threat sensing and responding is one way to achieve immediate reactions to imminent threats. There are already tools for an extensive automation of threat …
- 238000000034 method 0 abstract description 22
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11552996B2 (en) | Automated and adaptive model-driven security system and method for operating the same | |
US11783062B2 (en) | Risk-based access to computing environment secrets | |
US11405400B2 (en) | Hardening based on access capability exercise sufficiency | |
Amthor et al. | Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems | |
US8776180B2 (en) | Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms | |
US20160191476A1 (en) | Key management for compromised enterprise endpoints | |
US20160078225A1 (en) | Labeling objects on an endpoint for encryption management | |
US20160080418A1 (en) | Normalized indications of compromise | |
US20160080419A1 (en) | Data behavioral tracking | |
US20160191465A1 (en) | Firewall techniques for colored objects on endpoints | |
US20160080420A1 (en) | Using indications of compromise for reputation based network security | |
Patel et al. | A novel methodology towards a trusted environment in mashup web applications | |
US11973796B2 (en) | Dangling domain detection and access mitigation | |
Sengupta et al. | A formal methodology for detecting managerial vulnerabilities and threats in an enterprise information system | |
Bailey | Self-adaptive Authorisation Infrastructures | |
Ansari et al. | Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review | |
Ouchani et al. | Generating attacks in SysML activity diagrams by detecting attack surfaces | |
Metoui | Privacy-aware risk-based access control systems | |
Walter et al. | Tool-based attack graph estimation and scenario analysis for software architectures | |
Wagner | Conceptualization of a Trust Dashboard for Distributed Usage Control Systems | |
Hanspach et al. | A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems | |
Strategy | SANS Institute | |
Chauhan et al. | SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting | |
Nebbione | Valutazione della Sicurezza di Reti Informatiche tramite Intelligenza Artificiale: Un Approccio basato su Grafi | |
Diaz Tellez | Policy-Driven Adaptive Protection Systems. |