2019 International Conference on Cybersecurity (ICoCSec) 2019
DOI: 10.1109/icocsec47621.2019.8970786
|View full text |Cite
|
Sign up to set email alerts
|

Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…RAKKSSA framework provides safety guidelines to reduce the risk of Cyber-Attacks and protect the organization's information. Cyber threat intelligence can provide a timely reply to attacks [10]. To secure the data processing for IoT middleware systems Ayoade et al [27] presented an effective methodology to tackle the process of attacker authentication.…”
Section: Social Network Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…RAKKSSA framework provides safety guidelines to reduce the risk of Cyber-Attacks and protect the organization's information. Cyber threat intelligence can provide a timely reply to attacks [10]. To secure the data processing for IoT middleware systems Ayoade et al [27] presented an effective methodology to tackle the process of attacker authentication.…”
Section: Social Network Attacksmentioning
confidence: 99%
“…Despite the continuing effort of organizations to avoid Cyber-Security breaches and Cyber-Attacks, it is unavoidable because of successful attacks and their huge loss, and the effectiveness of Cyber-Security of networks becomes an essential issue. Ernst & Young reported that "Mobilization, virtualization, and cloud technology have created new technologies and opportunities in the business, making it more vulnerable to Cyber-Attacks" [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the DL model, the progress of a cyber security model is to automatically select features and provide feature learning in network layers [53]. The feature selection of anomaly detection techniques is a critical point for cyber network [54]. It can help to select general features such as unusual behavior of user to detect, predict, and prevent various types of attacks [55].…”
Section: Cyber Attacks Detectionmentioning
confidence: 99%
“…[26] Development an establishment of ISMS [27] Awareness measures [28], [29], [30], [31], [32], [33] Lack of skilled workers in public sector and effects [34], [35] Physical Security and Security Assessment [36], [37], [38], [39], [40] Legal framework parameters in cybersecurity domain [41], [42] Maturity models [43], [44] Most papers deal with the safeguarding of the technical components or tackle the analysis of cyber-attacks and pos-sible preventive measures. It is striking that a large number of papers put the staff in the focus and examine how their awareness for cybersecurity can be increased.…”
Section: Thematic Areamentioning
confidence: 99%