2020
DOI: 10.9781/ijimai.2020.08.003
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Detection and Recovery from Cyberattacks for Small and Medium-Sized Enterprises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…In a 2020 study by López, M.Á. on intelligent detection, the author outlined the different scenarios of cybercrime and what can be done to compensate the situation [37]. Here Lopez proposed an intelligent cybersecurity platform, which had been designed with the objective of helping SMEs to make their systems and network more secure and robust.…”
Section: Sme's View and Support On Machine Learningmentioning
confidence: 99%
See 2 more Smart Citations
“…In a 2020 study by López, M.Á. on intelligent detection, the author outlined the different scenarios of cybercrime and what can be done to compensate the situation [37]. Here Lopez proposed an intelligent cybersecurity platform, which had been designed with the objective of helping SMEs to make their systems and network more secure and robust.…”
Section: Sme's View and Support On Machine Learningmentioning
confidence: 99%
“…In Lopez, M.A. et al's [37] proposal, ML techniques were used for data collecting, testing, and evaluation, and the main goal was to determine the most efficient algorithm for intrusion detection. ML algorithms for supervised detection were compared, such as C4.5 (decision tree), Bayesian network, random forest, support vector machines (SVM), and artificial neural network (ANN).…”
Section: Sme's View and Support On Machine Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, it is intended to create a future collaborative environment to create and evaluate a MS-CSIRT oriented to ICS and IoT devices, between governments, international security organizations, ICS and IOT manufacturers, and companies working in this kind of environments [4], to promote a growth in security in this branch creating exclusive taxonomies [23] and galaxies in these environments within MISP, TheHIVE and cortex.…”
Section: Future Workmentioning
confidence: 99%
“…From the above information, we can see an alarming increase in costs due to information theft and breaches, types of threats and incident management; and many corporate and government companies rely on the promise of value offered by their suppliers in the different types of information security solutions. Some have the resources to be able to have a Security Operation Centre (SOC) or Computer Security Incident Response Team (CSIRT) where they can monitor and manage their IT infrastructure focusing on information security and security incident management, but small or medium sized companies do not have the capacity to access to these resources and do not introduce the protection mechanisms needed [4]. For this reason, governments have their national Cybernetic Emergencies Response Team (CERT) or CSIRT to provide support in information security incidents to government or corporate entities for the management of cyber security and cyber defense.…”
Section: Introductionmentioning
confidence: 99%