Paper on AI-based Detection of DNS Misuse for Network Security03-01-2023
I. Chiscop, F. Soro, P. Smith, “AI-based Detection of DNS Misuse for Network Security”.
NativeNi ’22: Proceedings of the 1st International Workshop on Native Network Intelligence, December 2022
4th SOCCRATES article in Dutch IB Magazine from PvIB06-03-2023
Susana González Zarzosa and Jesus Villalobos Nieto (both Atos Research & Innovation, Spain), “SOCCRATES – Automation and Orchestration of Security Operations”, IB magazine, 2023, Edition 1. This fourth article in PvIB magazine focuses on the SOCCRATES Orchestrator and Integration Engine which is at the core of the SOCCRATES platform providing automation and orchestration of security operations to response.
3rd SOCCRATES article in Dutch IB Magazine from PvIB17-10-2022
Reinder Wolthuis and Frank Fransen, “SOCCRATES – SOCCRATES – Vision & Roadmap for SOC & CSIRTs”, IB magazine, 2022, Edition 5. It is a summary of the ‘vision, roadmap and guidance for SOC’ booklet that was recently published.
SOCCRATES Vision Paper10-06-2022
Continuous innovation and investment in automation is needed in SOCs and CSIRTs to stay ahead of the threats. The SOCCRATES Vision Paper provides a vision and concrete next steps on innovative security automation and answers questions such as ‘Why should we invest in automated security and how do you start?’, ‘What does the Next Generation SOC looks like?’ and ‘How can we integrate automation into our way of working?’.
Paper at IEEE CSR 2021 conference (Best Paper Award)30-07-2021
A. Gylling, M. Ekstedt, Z. Afzal, and P. Eliasson, “Mapping cyber threat intelligence to probabilistic attack graphs”, 2021 IEEE International Conference on Cyber Security and Resilience, July 2021. (Best research paper award). A summary of the paper can be found here.
The paper is based on the Master Thesis of Andreas Gylling, and can be found here.
Paper at GraMSec 202023-06-2021
S. Katsikeas, S. Hacks, P. Johnson, M. Ekstedt, R. Lagerström, J Jacobsson, “An Attack simulation language for the IT domain”, International Workshop on Graphical Models for Security, GraMSec 2020, 67 -86, June 2020 link
Paper at CD-MAKE 202023-06-2021
Martin Teuffenbach, Ewa Piatkowska, Paul Smith, “Subverting Network Intrusion Detection:
Crafting Adversarial Examples Accounting for Domain-Specific Constraints”, International IFIP
Cross Domain (CD) Conference for Machine Learning & Knowledge Extraction (MAKE) 2020,
Online Event, pp. 301-320, 2020 link