Mostrando 2 resultados de: 2
Filtros aplicados
Área temáticas
Programación informática, programas, datos, seguridad(2)
Administración pública y ciencia militar(1)
Funcionamiento de bibliotecas y archivos(1)
Área de conocimiento
Ciencias de la computación(2)
Origen
google(1)
An integral model to provide reactive and proactive services in an academic csirt based on business intelligence
ArticleAbstract: Cyber-attacks have increased in severity and complexity. That requires, that the CERT/CSIRT researchPalabras claves:CSIRT, Cyber-attacks, DATA WAREHOUSE, ETL, Incident Managers, KIMBALL, OLAPS, Scrum, Vulnerability AnalysisAutores:Francisco Reyes, Paúl Valladares, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter FuertesFuentes:scopusA BI solution to identify vulnerabilities and detect real-time cyber-attacks for an academic CSIRT
Conference ObjectAbstract: The present study aims to automate the manual process of disseminating information from an AcademicPalabras claves:Business intelligence, CSIRT, CYBERSECURITY, DataMart, Ralph kimball, vulnerabilitiesAutores:Francisco Reyes, Hernán Aules, Pérez E., Tapia Freddy, Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopus