Next generation security operation center framework
Security Operation Centers (SOC) area necessary monitoring security solution for organization who want to have visibility on cybersecurity assets.
| Main Authors: | Mohamad Fadli, Zolkipli, Yau, Alan Ti Dun, Azizah, Abdul Aziz, Bee, Tan Fui |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/21853/ http://umpir.ump.edu.my/id/eprint/21853/1/7%29%20DR%20FADLI.pdf |
Similar Items
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Grasp on next generation security operation centre (NGSOC):
by: Dun, Yau Ti, et al.
Published: (2021)
by: Dun, Yau Ti, et al.
Published: (2021)
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018)
by: Tan, Fui Bee, et al.
Published: (2018)
Coinhive's monero drive-by crypto-jacking
by: Azizah, Abdul Aziz, et al.
Published: (2020)
by: Azizah, Abdul Aziz, et al.
Published: (2020)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Developing an efficient DMCIS with next-generation wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
A Context Aware Framework for User Centered Services
by: Hoh, Simon, et al.
Published: (2008)
by: Hoh, Simon, et al.
Published: (2008)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
Special issue on recent advances in next-generation and resource-constrained converged networks
by: Amin, Syed Obaid, et al.
Published: (2011)
by: Amin, Syed Obaid, et al.
Published: (2011)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
PolyAQG Framework: Auto-generating assessment questions
by: Tan, Tee Hean *, et al.
Published: (2021)
by: Tan, Tee Hean *, et al.
Published: (2021)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Towards Incorporation of Software Security Testing Framework in Software Development
by: Hassan, N. H., et al.
Published: (2011)
by: Hassan, N. H., et al.
Published: (2011)
Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Test Data Generation Framework for Automatic Programming Assessment
by: Rohaida, Romli, et al.
Published: (2014)
by: Rohaida, Romli, et al.
Published: (2014)
Mobile business intelligent center (MBIC)
by: Abd. Jalil, Rohaizan
Published: (2007)
by: Abd. Jalil, Rohaizan
Published: (2007)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
Design a Technique for Minimizing Unnecessary Handoff
in Mobile Wireless Networks
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
An integrated software quality model in a fuzzy analytical hierarchy process-based evaluation framework for e-learning software / Ahmad Fadli Saad
by: Ahmad Fadli , Saad
Published: (2017)
by: Ahmad Fadli , Saad
Published: (2017)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Design of an Ultra High Speed AES Processor for Next Generation IT Security.
by: Aris, Ishak, et al.
Published: (2011)
by: Aris, Ishak, et al.
Published: (2011)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
DNA Computing for Solving Distribution Center Location Problem
by: Hasudungan, Rofilde, et al.
Published: (2013)
by: Hasudungan, Rofilde, et al.
Published: (2013)
A conceptual IR Chatbot framework with automated keywords-based vector representation generation
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
A conceptual IR chatbot framework with Automated Keywords-based vector representation generation
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
Pairwise Test Suite Generation Using Adaptive Teaching Learning-Based Optimization Algorithm with Remedial Operator
by: Fakhrud, Din, et al.
Published: (2019)
by: Fakhrud, Din, et al.
Published: (2019)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Similar Items
-
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022) -
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023) -
Grasp on next generation security operation centre (NGSOC):
by: Dun, Yau Ti, et al.
Published: (2021) -
Methods of intrusion detection in information security incident detection: a comparative study
by: Tan, Fui Bee, et al.
Published: (2018) -
Coinhive's monero drive-by crypto-jacking
by: Azizah, Abdul Aziz, et al.
Published: (2020)