On detection and visualization techniques for cyber security situation awareness

Author(s):  
Wei Yu ◽  
Shixiao Wei ◽  
Dan Shen ◽  
Misty Blowers ◽  
Erik P. Blasch ◽  
...  
Author(s):  
Vardan Mkrttchian ◽  
Leyla Ayvarovna Gamidullaeva ◽  
Yulia Vertakova ◽  
Svetlana Panasenko

The chapter introduces the perspectives on the use of avatar-based management techniques for designing new tools to improve blockchain as technology for cyber security issues. The purpose of this chapter was to develop an avatar-based closed model with strong empirical grounding that provides a uniform platform to address issues in different areas of digital economy and creating new tools to improve blockchain technology using the intelligent visualization techniques. The authors show the essence, dignity, current state, and development prospects of avatar-based management using blockchain technology for improving implementation of economic solutions in the digital economy of Russia.


2011 ◽  
Vol 10 ◽  
pp. 1029-1034 ◽  
Author(s):  
Yan Zhang ◽  
Shuguang Huang ◽  
Shize Guo ◽  
Junmao Zhu

2019 ◽  
Vol 27 (5) ◽  
pp. 636-646
Author(s):  
Andrew M’manga ◽  
Shamal Faily ◽  
John McAlaney ◽  
Chris Williams ◽  
Youki Kadobayashi ◽  
...  

Purpose The purpose of this paper is to investigate security decision-making during risk and uncertain conditions and to propose a normative model capable of tracing the decision rationale. Design/methodology/approach The proposed risk rationalisation model is grounded in literature and studies on security analysts’ activities. The model design was inspired by established awareness models including the situation awareness and observe–orient–decide–act (OODA). Model validation was conducted using cognitive walkthroughs with security analysts. Findings The results indicate that the model may adequately be used to elicit the rationale or provide traceability for security decision-making. The results also illustrate how the model may be applied to facilitate design for security decision makers. Research limitations/implications The proof of concept is based on a hypothetical risk scenario. Further studies could investigate the model’s application in actual scenarios. Originality/value The paper proposes a novel approach to tracing the rationale behind security decision-making during risk and uncertain conditions. The research also illustrates techniques for adapting decision-making models to inform system design.


Author(s):  
Hemlata. R. Kosare ◽  
Kiran V. Likhar ◽  
Pranali Manapure

The progression of advanced data is developing a regular routine making it gradually hard to oversee and structure it or even to isolate what is significant based on what is pointless. Looked with this test, new encouraging achievement advancements are being created to bring 'information examination's to the following developmental level. Man-made reasoning (AI), specifically, is required to wind up huge in numerous fields. A few types of AI empower AI like profound learning can be utilized to perform prescient scrutiny. Their possible for the defense domain is huge as AI solutions are expected to develop in serious fields such as cyber defense, decision-support systems, risk management, pattern recognition, cyber situation awareness, projection, malware detection and data relationship to name but a few. One of the potential uses of AI in digital protection might be to empower the setting up of self-designing systems. It would imply that AI agendas could recognize vulnerabilities (programming bugs) and perform reaction activities such as self-fixing. This opens better approaches to fortifying correspondences and data frameworks security by giving system strength, avoidance and insurance against digital dangers.


Author(s):  
Vardan Mkrttchian ◽  
Leyla Ayvarovna Gamidullaeva ◽  
Yulia Vertakova ◽  
Svetlana Panasenko

The chapter introduces the perspectives on the use of avatar-based management techniques for designing new tools to improve blockchain as technology for cyber security issues. The purpose of this chapter was to develop an avatar-based closed model with strong empirical grounding that provides a uniform platform to address issues in different areas of digital economy and creating new tools to improve blockchain technology using the intelligent visualization techniques. The authors show the essence, dignity, current state, and development prospects of avatar-based management using blockchain technology for improving implementation of economic solutions in the digital economy of Russia.


Sign in / Sign up

Export Citation Format

Share Document