News Release on Cyber security Research: September-2018

At the Forefront of Cyber Security Research

Suzanna Schmeelk works at the forefront of cyber security analysis. In her role as each Berkeley R&D Engineer and a member of the Team for analysis in present Secure Technology (TRUST), she examines essential cybersecurity problems.

Trust could be a university and trade association that targeted cyber security problems and considerably impacts laptop technologies around the globe. Specifically, Trust examines cybersecurity problems relating to health care, national infrastructures, law and different problems facing the overall public. [1]

A Readiness Model for Measuring the Maturity of Cyber Security Incident Management

Hardly a week goes by while not headlines concerning new cyber-attacks. because the sophistication of cyber-attacks perpetually will increase, organizations got to concede to be littered with attacks. so as to effectively and expeditiously react to a happening, skilled and well-organized incident management needs to be in situ. [2]

Reflections on CIO research: The essential qualities sought after when hiring today’s cybersecurity leaders

The current security job market has become progressively troublesome to navigate. The uncertainty this could cause for CIOs, on prime of their mounting employment, is troublesome to deal with and causes exaggerated risk for the organization. whereas security roles could stay empty for extended periods of your time, what CIOs square measure sure of square measure the key traits they’re searching for in their next security leader. [3]

Cyber-Security Analysis of Transactive Energy Systems

Demand response and active participation of residential homes are expected to play an important role within the future good grids. Market primarily based transactive exchanges between prosumers are triggered by the accrued deployments of renewable generations and microgrid architectures. Transactive Energy Systems (TES) use economic and management mechanisms to dynamically balance the demand and provide across the total electrical grid. [4]

A Machine Learning Algorithm Based on Inverse Problems for Cyber Anomaly Detection

With the speedy rate of technological advance, digital communications became AN integral a part of our lives in e-commerce, healthcare, education, and government. because the cyber world has dilated and become a lot of advanced, it’s conjointly generated severe threats to cybersecurity. Adversarial attacks similar to anomalies and misuses square measure exhausting to sight with typical strategies as these cyber activities look terribly almost like real ones. [5]

Reference

[1] At the Forefront of Cyber Security Research

By Suzanna Schmeelk, Polytechnic Institute of New York University | August 5, 2011, 02:45 pm ET (web link)

[2] A Readiness Model for Measuring the Maturity of Cyber Security Incident Management

Rieger D, Tjoa S. A Readiness Model for Measuring the Maturity of Cyber Security Incident Management. InInternational Conference on Intelligent Networking and Collaborative Systems 2018 Sep 5 (pp. 283-293). Springer, Cham. (web link)

[3] Reflections on CIO research: The essential qualities sought after when hiring today’s cybersecurity leaders

Pales C. Reflections on CIO research: The essential qualities sought after when hiring today’s cybersecurity leaders. Cyber Security: A Peer-Reviewed Journal. 2018 Jan 1;2(1):31-7. (web link)

[4] Cyber-Security Analysis of Transactive Energy Systems

Krishnan VV, Zhang Y, Kaur K, Hahn A, Srivastava A, Sindhu S. Cyber-Security Analysis of Transactive Energy Systems. In2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D) 2018 Apr 16 (pp. 1-9). IEEE. (web link)

[5] A Machine Learning Algorithm Based on Inverse Problems for Cyber Anomaly Detection

Ali Sever1*

1Department of Computer Information Systems, Pfeiffer University, Charlotte, NC, 28109, USA. (web link)

Leave a Reply

Your email address will not be published. Required fields are marked *