Nothing Special   »   [go: up one dir, main page]

Amthor et al., 2019 - Google Patents

Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems

Amthor et al., 2019

Document ID
15233447890281075624
Author
Amthor P
Fischer D
Kühnhauser W
Stelzer D
Publication year
Publication venue
Proceedings of the 14th International Conference on Availability, Reliability and Security

External Links

Snippet

Cyber security management requires fast and cost efficient responses to threat alerts. Automation of cyber threat sensing and responding is one way to achieve immediate reactions to imminent threats. There are already tools for an extensive automation of threat …
Continue reading at dl.acm.org (other versions)

Similar Documents

Publication Publication Date Title
US11552996B2 (en) Automated and adaptive model-driven security system and method for operating the same
US11783062B2 (en) Risk-based access to computing environment secrets
US11405400B2 (en) Hardening based on access capability exercise sufficiency
Amthor et al. Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems
US8776180B2 (en) Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
US20160191476A1 (en) Key management for compromised enterprise endpoints
US20160078225A1 (en) Labeling objects on an endpoint for encryption management
US20160080418A1 (en) Normalized indications of compromise
US20160080419A1 (en) Data behavioral tracking
US20160191465A1 (en) Firewall techniques for colored objects on endpoints
US20160080420A1 (en) Using indications of compromise for reputation based network security
Patel et al. A novel methodology towards a trusted environment in mashup web applications
US11973796B2 (en) Dangling domain detection and access mitigation
Sengupta et al. A formal methodology for detecting managerial vulnerabilities and threats in an enterprise information system
Bailey Self-adaptive Authorisation Infrastructures
Ansari et al. Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review
Ouchani et al. Generating attacks in SysML activity diagrams by detecting attack surfaces
Metoui Privacy-aware risk-based access control systems
Walter et al. Tool-based attack graph estimation and scenario analysis for software architectures
Wagner Conceptualization of a Trust Dashboard for Distributed Usage Control Systems
Hanspach et al. A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems
Strategy SANS Institute
Chauhan et al. SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting
Nebbione Valutazione della Sicurezza di Reti Informatiche tramite Intelligenza Artificiale: Un Approccio basato su Grafi
Diaz Tellez Policy-Driven Adaptive Protection Systems.