2018 IEEE International Conference on Big Data (Big Data) 2018
DOI: 10.1109/bigdata.2018.8622165
|View full text |Cite
|
Sign up to set email alerts
|

Determining Viability of Deep Learning on Cybersecurity Log Analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…By understanding these vulnerabilities, it is possible to develop better defenses against social engineering attacks. According to Symantec Security Response, just 4 % of cyber-attacks are brought on by technical flaws and software exploitation methods [5]. Although our findings show that some measures are being taken to protect social media data, the vast majority of the analyzed posts indicated a need for further improvement in data security.…”
Section: Introductionmentioning
confidence: 69%
“…By understanding these vulnerabilities, it is possible to develop better defenses against social engineering attacks. According to Symantec Security Response, just 4 % of cyber-attacks are brought on by technical flaws and software exploitation methods [5]. Although our findings show that some measures are being taken to protect social media data, the vast majority of the analyzed posts indicated a need for further improvement in data security.…”
Section: Introductionmentioning
confidence: 69%
“…Understanding these vulnerabilities makes it possible to develop better defenses against social engineering attacks. According to Symantec Security Response, just 4% of cyber-attacks are brought on by technical flaws and software exploitation methods [6]. Although our findings show that some measures are being taken to protect social media data, the vast majority of the analyzed posts indicated a need for further improvement in data security.…”
Section: Introductionmentioning
confidence: 69%
“…The Federal Energy Management Committee examines and publishes this email dataset to the network. In the research work (Lorenzen et al, 2018), data was collected from "Cybersecurity Environment for Detection, Analysis, and Reporting" (CEDAR).…”
Section: P Other Datasetsmentioning
confidence: 99%