Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Identifying, gathering, and maintaining information on the current, planned, and target states of the architecture of an enterprise is one major challenge of enterprise architectur...
Sabine Buckl, Florian Matthes, Christian M. Schwed...
User-Centered Design is surprisingly difficult. One of the biggest issues, certainly for those with no HCI or usability experience, is a lack of appreciation of how users think an...
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
A powerful and useful approach for modeling knowledge and qualitative reasoning is the Cognitive Map. The background of Cognitive Maps is the research about learning environments c...