A Cybersecurity Situational Awareness and Information-sharing Solution for Local Public Administrations Based on Advanced Big Data Analysis : The CS-AWARE Project
暂无分享,去创建一个
J. Röning | Matteo Bregonzio | G. Quirchmayr | T. Schaberreiter | Christopher C. Wills | Veronika Kupfersberger | A. Koumpis | J. Sales | Laurentiu A. Vasiliu | Kim Gammelgaard | A. Papanikolaou | K. Rantos | Arnolt Spyros
[1] Peter Checkland,et al. Systems Thinking, Systems Practice , 1981 .
[2] Karl N. Levitt,et al. How to sanitize data? , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[3] Juha Röning,et al. Graphingwiki - a Semantic Wiki extension for visualising and inferring protocol dependency , 2006, SemWiki.
[4] Jeff Kramer,et al. Is abstraction the key to computing? , 2007, CACM.
[5] Saikou Y. Diallo,et al. A Conceptual Modeling Method for Critical Infrastructure Modeling , 2008, 41st Annual Simulation Symposium (anss-41 2008).
[6] Qing Li,et al. Modeling and Analysis of Enterprise and Information Systems: From Requirements to Realization , 2009 .
[7] Schahram Dustdar,et al. A survey on self-healing systems: approaches and systems , 2010, Computing.
[8] Patrice Clemente,et al. From a Generic Framework for Expressing Integrity Properties to a Dynamic mac Enforcement for Operating Systems , 2010, Trans. Comput. Sci..
[9] Juha Röning,et al. Socio-technical Security Assessment of a VoIP System , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[10] Djamel Khadraoui,et al. Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper) , 2011, CRITIS.
[11] Jean-Daniel Zucker,et al. Abstraction in Artificial Intelligence and Complex Systems , 2013, Springer New York.
[12] Gregory A. Witte,et al. Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .
[13] J. C. Jiang,et al. Finding influential agent groups in complex multiagent software systems based on citation network analyses , 2015, Adv. Eng. Softw..
[14] Simon A. Dobson,et al. A survey of self‐healing systems frameworks , 2015, Softw. Pract. Exp..
[15] Srividya Kona Bansal,et al. Integrating Big Data: A Semantic Extract-Transform-Load Framework , 2015, Computer.
[16] Juliano Efson Sales,et al. A Compositional-Distributional Semantic Model for Searching Complex Entity Categories , 2016, *SEM@ACL.
[17] David Waltermire,et al. Guide to Cyber Threat Information Sharing , 2016 .
[18] André Freitas,et al. Graphene: Semantically-Linked Propositions in Open Information Extraction , 2018, COLING.