How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations

11 Jan 2019 Grispos George Glisson William Bradley Storer Tim

An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, and recorded in relevant datastores... (read more)

PDF Abstract
No code implementations yet. Submit your code now

Categories


  • CRYPTOGRAPHY AND SECURITY
  • COMPUTERS AND SOCIETY