2017 International Conference on Cyber Incident Response, Coordination, Containment &Amp; Control (Cyber Incident) 2017
DOI: 10.1109/cyberincident.2017.8054637
|View full text |Cite
|
Sign up to set email alerts
|

ThreatVectors: contextual workflows and visualizations for rapid cyber event triage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…However, few works have focused on mitigation strategies for innate vulnerabilities. Visual support systems have been used for rapid cyber event triage [27] and alert investigations [28], and eye-tracking data have been incorporated to enhance attention for phishing identification [29]. The authors in [30] perform an anthropological study in a corporate SOC to model and mitigate security analyst burnout.…”
Section: B Feint Attacks and Human Attentional Modelsmentioning
confidence: 99%
“…However, few works have focused on mitigation strategies for innate vulnerabilities. Visual support systems have been used for rapid cyber event triage [27] and alert investigations [28], and eye-tracking data have been incorporated to enhance attention for phishing identification [29]. The authors in [30] perform an anthropological study in a corporate SOC to model and mitigate security analyst burnout.…”
Section: B Feint Attacks and Human Attentional Modelsmentioning
confidence: 99%