Index Link

  • RootNode

Item

{"_buckets": {"deposit": "e85632d9-1439-48ad-822b-44001086df77"}, "_deposit": {"id": "4607", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4607"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4607", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In counteraction to the increasing threat ofcyber terrorism, the modeling to be predicted inguessing the predictive models for estimating theincidence of cyber-attacks for enterprise network inMyanmar are seriously needed. Although we needthese models, there is no record of attacks,defenseless, outcome and threat to utilize thedeveloping predictive models and authentication. Themain purpose of this research is to determinewhether SOC (Security Operation Center) manageruses cyber security model by using SOC resultsfigures to prepare further cyber defense and incidentresponse plan. The goal of this study was achieved byconducting experiments on various cyber-attacksoccurred in security operation center of IndustrialControl System (ICS).Blue team, Incident Handling, SOC,Cyber Security Model, Vulnerabilities, Threats,Attack."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Blue team"}, {"interim": "Incident Handling"}, {"interim": "SOC"}, {"interim": "Cyber Security Model"}, {"interim": "Vulnerabilities"}, {"interim": "Threats"}, {"interim": "Attack"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-03-17"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar.pdf", "filesize": [{"value": "330 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 330000.0, "url": {"url": "https://meral.edu.mm/record/4607/files/Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar.pdf"}, "version_id": "6b7108e0-a1e3-4a9d-8274-ee5a27436a63"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Wai Phyo"}, {"subitem_authors_fullname": "Lwin, Htar Htar"}, {"subitem_authors_fullname": "Lin, Kyaw Kyaw"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2020-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-1-7281-5925-6"}, "item_title": "Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004607", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-03-17"}, "publish_date": "2020-03-17", "publish_status": "0", "recid": "4607", "relation": {}, "relation_version_is_last": true, "title": ["Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar"], "weko_shared_id": -1}

Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar

http://hdl.handle.net/20.500.12678/0000004607
7c6537bb-a762-42b6-a2c8-6c58b14d60fc
e85632d9-1439-48ad-822b-44001086df77
None
Name / File License Actions
Developing Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar.pdf (330 Kb)
Publication type
Article
Upload type
Publication
Title
Title Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar
Language en
Publication date 2020-02-28
Authors
Aung, Wai Phyo
Lwin, Htar Htar
Lin, Kyaw Kyaw
Description
In counteraction to the increasing threat ofcyber terrorism, the modeling to be predicted inguessing the predictive models for estimating theincidence of cyber-attacks for enterprise network inMyanmar are seriously needed. Although we needthese models, there is no record of attacks,defenseless, outcome and threat to utilize thedeveloping predictive models and authentication. Themain purpose of this research is to determinewhether SOC (Security Operation Center) manageruses cyber security model by using SOC resultsfigures to prepare further cyber defense and incidentresponse plan. The goal of this study was achieved byconducting experiments on various cyber-attacksoccurred in security operation center of IndustrialControl System (ICS).Blue team, Incident Handling, SOC,Cyber Security Model, Vulnerabilities, Threats,Attack.
Keywords
Blue team, Incident Handling, SOC, Cyber Security Model, Vulnerabilities, Threats, Attack
Identifier 978-1-7281-5925-6
Journal articles
Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020)
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats