2020 IEEE International Conference on Big Data (Big Data) 2020
DOI: 10.1109/bigdata50022.2020.9378213
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threat Hunting Through Automated Hypothesis and Multi-Criteria Decision Making

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
0
2
0
1
Order By: Relevance
“…However, the public's sustainable use of e-Government services is highly dependent on the level of security. Services provided through the Internet and mobile connections in e-Government are very vulnerable to cybercrime threats [4], [7]. And in fact, government institutions as service providers may not always be able to predict and defend against all types of cybercrime attacks [4], [7]- [9].…”
Section: Introduction As People's Internet Activities Increased Durin...mentioning
confidence: 99%
See 1 more Smart Citation
“…However, the public's sustainable use of e-Government services is highly dependent on the level of security. Services provided through the Internet and mobile connections in e-Government are very vulnerable to cybercrime threats [4], [7]. And in fact, government institutions as service providers may not always be able to predict and defend against all types of cybercrime attacks [4], [7]- [9].…”
Section: Introduction As People's Internet Activities Increased Durin...mentioning
confidence: 99%
“…Services provided through the Internet and mobile connections in e-Government are very vulnerable to cybercrime threats [4], [7]. And in fact, government institutions as service providers may not always be able to predict and defend against all types of cybercrime attacks [4], [7]- [9]. E-Government is a mechanism of governance and public services based on information and internet communication technology to improve services from public sector organizations or government [4]- [6], [10].…”
Section: Introduction As People's Internet Activities Increased Durin...mentioning
confidence: 99%
“…Una vez se conocen tanto las distintas arquitecturas de aplicación como los distintos mecanismos de comunicación empleados en la actualidad, el siguiente paso consiste en analizar cuales son los recursos actuales que se pueden emplear para los distintos componentes que puede tener una arquitectura de aplicación para un sistema de caza de amenazas basado en AI. Tras estudiar los estudios expuestos en la sección anterior [10,16,81,95,105,113,189,209,228,229], se podrían clasificar dichos componentes en:…”
Section: Recursos Actualesunclassified