Enabling Rapid Response and Service Restoration with Machine Learning Techniques (English)
- New search for: Lopes, Andre
- New search for: Hutchison, Andrew
- New search for: Lopes, Andre
- New search for: Hutchison, Andrew
In:
19th European Conference on Cyber Warfare and Security (ECCWS 2020)
; 561-569
;
2020
-
ISBN:
- Conference paper / Print
-
Title:Enabling Rapid Response and Service Restoration with Machine Learning Techniques
-
Contributors:Lopes, Andre ( author ) / Hutchison, Andrew ( author )
-
Conference:ECCWS ; 19. ; 2020 ; Online
-
Published in:
-
Publisher:
- New search for: Curran Associates, Inc.
-
Place of publication:Red Hook, NY
-
Publication date:2020
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
- New search for: 54.38 / 89.83
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
On the Security of the EMV Authentication Methods of Contactless CardsAl-Maliki, Ossama / Al-Assam, Hisham et al. | 2020
- 13
-
Online Fraud & Money Laundry in E-CommerceAlsaibai, Hasan / Waheed, Shooq / Alaali, Fatima / Wadi, Rami Abu et al. | 2020
- 20
-
Cyber Humanity in Cyber WarBarbosa, Jorge et al. | 2020
- 26
-
Detecting a Rogue Switch using Network AutomationBhuse, Vijay / James, Vineet et al. | 2020
- 32
-
An Investigation into Evidence (Digital) Artefacts Resulting from the use of Cryptocurrency ApplicationsBlenkin, Stephen / Davies, Gareth / Eden, Peter et al. | 2020
- 42
-
Information Sharing in Cyber Defence ExercisesBrilingaité, Agné / Bukauskas, Linas / Juozapavičius, Aušrius / Kutka, Eduardas et al. | 2020
- 50
-
Analysis of Reports on Cyber Threats Attacks Using Text-Analytical SoftwareBurita, Ladislav et al. | 2020
- 61
-
Tracking Botnets on Nation Research and ivan Education NetworkBurke, Daniel / Herbert, Alan et al. | 2020
- 72
-
Fostering Cybersecurity Awareness Among Computing Science Undergraduate Students: Motivating by ExampleCruz, Tiago / Simões, Paulo et al. | 2020
- 82
-
Cyber Crisis Management and LeadershipDanet, Didier / Weber, Claude et al. | 2020
- 89
-
Water Distribution Network Leak Detection ManagementConing, Arno de / Mouton, Francois et al. | 2020
- 98
-
Cyber as a Hybrid Threat to NATO's Operational Energy SecurityDupuy, Arnold / Iftimie, lon / Nussbaum, Daniel / Pickl, Stefan et al. | 2020
- 107
-
Cyber Counterintelligence: Some Contours towards the Academic Research AgendaDuvenage, Petrus / Jaquire, Victor / Solms, Sebastian von et al. | 2020
- 117
-
An Ontology for Cyber ISTAR in Offensive Cyber OperationsGrant, Tim / Wout, Carien van 't / Niekerk, Brett van et al. | 2020
- 126
-
The Weapons of Choice: Terrorist Armament Culture and the Use of Firearms in Online Propaganda and Identitv-Building through CyberspaceHaberl, Ferdinand J. et al. | 2020
- 136
-
What LEGAD needs to know? Analysis of AARs from Locked Shields (2012-2018)Harašta, Jakub et al. | 2020
- 143
-
Strengthening the Cybersecurity of Smart Grids: The Role of Artificial Intelligence in Resiliency of Substation Intelligent Electronic DevicesIftimie, lon A. / Huskaj, Gazmend et al. | 2020
- 151
-
Online Polarization, Radicalization and ConspiracyJääskeläinen, Petri / Huhtinen, Aki-Mauri et al. | 2020
- 158
-
An Ontology for the South African Protection of Personal Information ActJafta, Y. / Leenen, L. / Chan, P. et al. | 2020
- 168
-
Usefulness of Cyber Attribution IndicatorsKarlzén, Henrik et al. | 2020
- 177
-
Turning the Asymmetry Around: Tactical Principles of Warfare in the Cvber DomainKiviharju, Mikko / Huttunen, Mika et al. | 2020
- 186
-
Finnish View on the Combat Functions in the Cyber DomainKiviharju, Mikko / Huttunen, Mika / Kantola, Harry et al. | 2020
- 195
-
Cyber Wargaming on the Technical/Tactical Level: The Cyber Resilience Card Game (CRCG)Kodalle, Thorsten et al. | 2020
- 205
-
Using Machine Learning for DNS over HTTPS DetectionKonopa, Michal / Fesl, Jan / Jelinek, Jiři / Feslová, Marie / Cehák, Jiří / Janeček, Jan / Drdák, František et al. | 2020
- 212
-
Towards Cyber Sensing: Venturing Beyond Traditional Security EventsLavrenovs, Artürs / Heinäaro, Kimmo / Orye, Erwin et al. | 2020
- 221
-
Cyber Security Capacity Building: Cyber Security Education in Finnish UniversitiesLehto, Martti et al. | 2020
- 232
-
How to Secure the Communication and Authentication in the lloT: A SRAM-based Hybrid CryptosystemLipps, Christoph / Ahr, Pascal / Schotten, Hans Dieter et al. | 2020
- 241
-
Blockchain Based Voting SystemsSoni, Yash / Maglaras, Leandros / Ferrag, Mohamed Amine et al. | 2020
- 249
-
The Future Direction of Cybercrime and the Difficulties of Digital Investigations: A Rationale for a Review of Digital Investigation Specialist EducationMison, Angela / Davies, Gareth / Eden, Peter et al. | 2020
- 258
-
Hybrid Warfare in Society's Information Environment: An Empirical Analysis Using the Grounded TheoryMustonen-Ollila, Erja / Lehto, Martti J. / Heikkonen, Jukka et al. | 2020
- 268
-
Actors in Society’s Hybrid information Environment: Grounded Theory Analvsis andMustonen-Ollila, Erja / Lehto, Martti J. / Heikkonen, Jukka et al. | 2020
- 278
-
Young People and the Dark Side of Social Media: Possible Threats to National SecurityNorri-Sederholm, Teija / Riikone, Reetta / Moilanen, Panu / Huhtinen, Aki-Mauri et al. | 2020
- 284
-
Fault Tolerance: An Approach Toward a Hybrid Fault Tolerance Framework Within a Distributed Computer ArchitectureO'Flaherty, Christopher / Hyman, Louis / Hodgson, Malcolm / Blaauw, Dewald et al. | 2020
- 295
-
Mobile Forensics: Beyond Traditional Sources of Digital EvidencePieterse, Heloise et al. | 2020
- 304
-
Cyber Security: Trust Based Architecture in the Management of an Organization's SecurityPöyhönen, Jouni / Lehto, Martti et al. | 2020
- 314
-
Cybersecurity Awareness in an Industrial Control Systems CompanyPrins, Stefan / Marnewick, Annlizé / Solms, Suné von et al. | 2020
- 324
-
Ransomware Attacks Against Critical InfrastructureRege, Aunshul / Bleiman, Rachel et al. | 2020
- 334
-
Cyber-Informed: Bridging Cybersecurity and Other DisciplinesSample, Char / Loo, Sin Ming / Justice, Connie / Taylor, Eleanor / Hampton, Clay et al. | 2020
- 342
-
Towards a Methodology for the Classification of loT DevicesSarris, Dimitrios / Xynos, Konstantinos / Read, Huw / Sutherland, lain et al. | 2020
- 351
-
Cyber Security System of FPGA Platform for Wireless Sensor NetworksTulemissova, Gulfarida / Baimuratov, Olimzhon et al. | 2020
- 362
-
Security of Systems on ChipTumer, Eda / Maglaras, Leandros et al. | 2020
- 371
-
Influence of Attack Vectors on Generic Artificial Intelligence —assisted Smart Building Feedback Loop SystemVähäkainu, Petri / Lehto, Martti / Kariluoto, Antti et al. | 2020
- 380
-
Assessment of the French and Dutch Perspectives on International Law and Cyber- and OperationsNiekerk, Brett van / Ramluckan, Trishana / Ventre, Daniel et al. | 2020
- 390
-
Signing Your Name Away: An Overview on the Risks of Electronic SignaturesSolms, Suné von et al. | 2020
- 398
-
Artificial Intelligence and its' Legal Risk to CybersecurityWatney, M. M. et al. | 2020
- 406
-
Smart City loT: Co-Designing Trustworthy Public Safety Drones for Indoor Flight MissionsWingo, Harry et al. | 2020
- 410
-
The Evolution of Ransomware VariantsWood, Ashley Charles / Eze, Thaddeus et al. | 2020
- 421
-
Vulnerabilities Analysis of Software Solutions for Critical Activity SectorsZamfiroiu, Alin / Badea, Victor Emmanuell / Pocatilu, Paul et al. | 2020
- 428
-
Small Network Telescope for Advanced Security MonitoringZeghache, Linda / Yacine, Hakimi et al. | 2020
- 435
-
A Viewpoint on Management Practices for Cybersecurity in Industry 4.0 EnvironmentZia, Najam Ul / Owusu, Victor Kwarteng et al. | 2020
- 442
-
A Change Management Perspective to Implementing a Cyber Security CultureRamluckan, Trishana / Niekerk, Brett van / Martins, Isabel et al. | 2020
- 451
-
Cyberattacks and the Prohibition of the Use of Force under Humanitarian Law with Reference to the Tallinn ManualAkbariavaz, Khalil / Tehrani, Pardis Moslemzadeh / Sabaruddin, Johan Shamsuddin bin Haj et al. | 2020
- 458
-
A Study on Problems of Behaviour-based User Attribution in Computer Forensic Investigation Attribution in Computer Forensic InvestigationAkotoye, Francis Xavier Kofi / Adevemi, Richard Ikuesan / Venter, Hein S. et al. | 2020
- 466
-
Defining the Workforce and Training Array for the Cyber Risk Management and Cyber Resilience Methodology of an ArmyDavidson, Lisa et al. | 2020
- 473
-
Designing Attack Infrastructure for Offensive Cyberspace OperationsHuskaj, Gazmend / Iftimie, lon A. / Wilson, Richard L. et al. | 2020
- 483
-
Applications of Epidemiology to CybersecurityModini, Jessemyn / Lynar, Timothy / Sitnikova, Elena / Joiner, Keith et al. | 2020
- 491
-
Computational Propaganda: Targeted Advertising and the Perception of TruthMurphy, Julie / Keane, Anthony / Power, Aurelia et al. | 2020
- 501
-
Comparing Personality Traits Between Penetration Tester, Information Security and its Professionals from Two CohortsOpedal, Olav et al. | 2020
- 510
-
A Framework for a Foundational Cyber — Counterintelligence Awareness and Skills Training ProgrammeSithole, Thenjiwe / Toit, Jaco du / Jaquire, Victor / Solms, Sebastian von et al. | 2020
- 518
-
The Three "Cyber Logics" and Their Implications to Cyber Conflicts: Germany, France, and the United Kingdom as Case StudiesAlcǎntara, Bruna Toso de et al. | 2020
- 526
-
Cyber Deterrence and Russia's Active Cyber DefenseTurunen, Maija / Kari, Martti J et al. | 2020
- 533
-
The Roots of Restraint in Cyber ConflictVariola, Federico et al. | 2020
- 545
-
Strategic Cyber Threat Intelligence: Building the Situational Picture with Emerging TechnologiesVoutilainen, Janne / Kari, Martti et al. | 2020
- 554
-
Event Tracing for Application Security Monitoring in LinuxWhitter-Jones, Jack / Griffiths, Mark / Davies, Ross et al. | 2020
- 561
-
Enabling Rapid Response and Service Restoration with Machine Learning TechniquesLopes, Andre / Hutchison, Andrew et al. | 2020
- 570
-
Using Ethereum Smart Contracts for Botnet Command and ControlOliveira, Alexandre / Gonçalves, Vinícius / Filho, Geraldo Rocha et al. | 2020
- 577
-
Towards Cyber-User Awareness: Design and EvaluationOyinloye, Toyosi / Eze, Thaddeus / Speakman, Lee et al. | 2020
- 589
-
OS Kernel Malware Detection through Data- Characterization of Memory AnalysisHar, Harmi Armira Mohamad / Ghazali, Farihan / Daud, Maslina et al. | 2020
- 599
-
Mitigating Insider Threats: A Case Study of Data Leak PreventionMohd, Nurul / Yunos, Zahri et al. | 2020
- 609
-
Modern Techniques for Discovering Digital SteganographyHegarty, Michael T. / Keane, Anthony J. et al. | 2020
- 614
-
SHAPES Secure Cloud Platform for HealthCare Solutions and ServicesRajamäki, Jyri / Hummelholm, Aarne et al. | 2020
- 621
-
Artificial Intelligence in Megaprojects: The Next FrontierGreiman, Virginia A. et al. | 2020