Search
Now showing items 1-5 of 5
Towards improved trust in threat intelligence sharing using Blockchain and trusted computing.
(IEEE Xplore, 2019-10)
Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat intelligence sharing communities exist. There is a general consensus that many challenges remain to ...
Anomaly detection in cyber security
(Athlone Institute of Technology, 2020-06)
Identify anomalous (outliers) system call sequences in security domain (Host based Intrusion Detection System).
Applying process mining to improve microservices cyber security situational awareness.
(Athlone Institute of Technology, 2020-06)
Cyber Security Incident Response Teams (CSIRTs) for enterprise networks are often overwhelmed by newer, more sophisticated forms of cyber attack. Improved cyber security techniques are in high demand. At present, microservices ...
Deep neural networks for sequence based anomaly detection in cyber security
(Athlone Institute of Technology, 2019)
Cyber security has become one of the most challenging
aspects of modern world digital technology and it has
become imperative to minimize and possibly avoid the
impact of cybercrimes. Host based intrusion detection
systems ...
Anomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networks
(Elsevier, 2022-04-22)
Currently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high ...