This Paper Presents a computer-based census management system which is a software application designed to collect, store, manage, and analyze census data electronically. It replaces traditional paper-based methods of ...
详细信息
In the dynamic landscape of cybersecu-rity and cyber warfares, Cyber Threat Intelligence (CTI) is increasingly relied on for gathering and sharing the latest information about threats and their trends. Current CTI sha...
详细信息
ISBN:
(数字)9798350376562
ISBN:
(纸本)9798350376579
In the dynamic landscape of cybersecu-rity and cyber warfares, Cyber Threat Intelligence (CTI) is increasingly relied on for gathering and sharing the latest information about threats and their trends. Current CTI sharing methods (e.g., ISACs, automated STIX/TAXII platforms), face challenges in terms of scalability, trust, and data quality issues. This is because they often lack systematic metrics for evaluating the quality and relevance of the threat data that are being shared. Moreover, they do not offer any mechanism to enable participating organizations to autonomously make decisions as to what Threat Intelligence providers to request and share data from/to. To address these limitations, we propose a novel Threat Intelligence sharing approach based on coalitional game theory. We first propose a set of metrics that enable organizations to assess the effectiveness of the shared Threat Intelligence data. Based on these metrics, we propose a preference function and a coalition formation algorithm that enable organizations to autonomously join and leave Threat Intelligence coalitions until reaching a Nash-Stable situation wherein no organization has incentive to leave its current coalition and join another one. Experiments suggest that our solution significantly improves the Mean Time to Detect (MTTD), Mean Time to Respond (MTTR) and Containment Rate.
Multiplication is the most essential function carried out by the arithmetic and logic unit. The multiplier specifically has important applications in signal processing analysis, image processing analysis, and so on. T...
详细信息
Text data forensics, a rapidly developing field that focuses on analyzing textual content to identify criminal or suspicious activities, is becoming increasingly important due to the popularity and the huge number of ...
详细信息
Modern Internet of Things (IoT) systems are highly complex due to its mobile, ad-hoc and geographically distributed nature. Very often, an edge-cloud infrastructure is established to offer intelligent services in mode...
详细信息
The DCP/Vardis protocol stack is designed to support coordination and sensor data exchange tasks in ad-hoc type large-scale and multi-hop networks of drones (or drone swarms), by piggybacking coordination and sensor d...
详细信息
ISBN:
(数字)9798331524371
ISBN:
(纸本)9798331524388
The DCP/Vardis protocol stack is designed to support coordination and sensor data exchange tasks in ad-hoc type large-scale and multi-hop networks of drones (or drone swarms), by piggybacking coordination and sensor data onto frequently transmitted beacon packets that are present anyway to help with collision avoidance. The Vardis protocol introduces the concept of a variable, which is available to all nodes, and for which information about any modifying operation (create, update, delete) is disseminated globally using beacons. In this paper we study the sensitivity of Vardis application performance metrics related to reliability and delay to some of its key parameters. This sensitivity analysis allows to assess the relative impact of these parameters and to derive recommendations for setting their values.
Pattern mining is a core objective within data mining, involving the detection of frequent itemsets (collections of values) within databases. This process serves to extract valuable insights from the data, facilitatin...
详细信息
The rise in Machine Learning algorithms for identifying SMS spam has become popular due to a significant surge in unwanted text messages. Detecting SMS spam holds crucial importance for several reasons. Firstly, it ca...
详细信息
Malware analysis is a complex process of examining and evaluating malicious software's functionality, origin, and potential impact. This arduous process typically involves dissecting the software to understand its...
详细信息
The rapid advent of Large Language Models (LLMs), such as ChatGPT and Claude, is revolutionizing various fields, from education and healthcare to the engineering of reliable software systems. These LLMs operate throug...
详细信息
暂无评论