Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment

    Minkyung Lee1, Julian Jang-Jaccard2, Jin Kwak3,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 199-223, 2022, DOI:10.32604/cmc.2022.028495 - 18 May 2022

    Abstract New technologies that take advantage of the emergence of massive Internet of Things (IoT) and a hyper-connected network environment have rapidly increased in recent years. These technologies are used in diverse environments, such as smart factories, digital healthcare, and smart grids, with increased security concerns. We intend to operate Security Orchestration, Automation and Response (SOAR) in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged. To facilitate the understanding of the security concern involved in this newly… More >

  • Open Access

    ARTICLE

    AI/ML in Security Orchestration, Automation and Response: Future Research Directions

    Johnson Kinyua1, Lawrence Awuah2,*

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 527-545, 2021, DOI:10.32604/iasc.2021.016240 - 01 April 2021

    Abstract Today’s cyber defense capabilities in many organizations consist of a diversity of tools, products, and solutions, which are very challenging for Security Operations Centre (SOC) teams to manage in current advanced and dynamic cyber threat environments. Security researchers and industry practitioners have proposed security orchestration, automation, and response (SOAR) solutions designed to integrate and automate the disparate security tasks, processes, and applications in response to security incidents to empower SOC teams. The next big step for cyber threat detection, mitigation, and prevention efforts is to leverage AI/ML in SOAR solutions. AI/ML will act as a More >

Displaying 1-10 on page 1 of 2. Per Page