Honeypot Data to Improve Threat Detection
What are we still missing ? Background Ezeife, Dong, and Aggarwal (2008) describe the frustrations of intrusion detection of cyber-threats...
What are we still missing ? Background Ezeife, Dong, and Aggarwal (2008) describe the frustrations of intrusion detection of cyber-threats...
Quality is not just a matter of performance Supply chain quality management efforts now require supply chain security management focus...
Why is the Problem Statement so Important? A practical problem statement should raise “the questions asked and the reasons for...
A Matter of Whether You Want to Go to the Dance The use of a theoretical framework is most associated...
The Threat Hunt Team and Cyber Threat Intelligence (CTI) Connection The Master Threat Hunting Database (MTHDB). The MTHDB is a...
An Evolution for Cyber Threat Intelligence Classic Indicators of Compromise (C-IOC) are based upon heuristic, static, “rules of thumb.” If...
Quantitative and Qualitative Research Designs can no longer stand on their own Abstract The author conducts a literature review on...