{"created":"2020-09-01T15:10:58.449330+00:00","id":4607,"links":{},"metadata":{"_buckets":{"deposit":"e85632d9-1439-48ad-822b-44001086df77"},"_deposit":{"id":"4607","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4607"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4607","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"In counteraction to the increasing threat ofcyber terrorism, the modeling to be predicted inguessing the predictive models for estimating theincidence of cyber-attacks for enterprise network inMyanmar are seriously needed. Although we needthese models, there is no record of attacks,defenseless, outcome and threat to utilize thedeveloping predictive models and authentication. Themain purpose of this research is to determinewhether SOC (Security Operation Center) manageruses cyber security model by using SOC resultsfigures to prepare further cyber defense and incidentresponse plan. The goal of this study was achieved byconducting experiments on various cyber-attacksoccurred in security operation center of IndustrialControl System (ICS).Blue team, Incident Handling, SOC,Cyber Security Model, Vulnerabilities, Threats,Attack."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Blue team"},{"interim":"Incident Handling"},{"interim":"SOC"},{"interim":"Cyber Security Model"},{"interim":"Vulnerabilities"},{"interim":"Threats"},{"interim":"Attack"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-03-17"}],"displaytype":"preview","filename":"Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar.pdf","filesize":[{"value":"330 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4607/files/Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar.pdf"},"version_id":"6b7108e0-a1e3-4a9d-8274-ee5a27436a63"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Wai Phyo"},{"subitem_authors_fullname":"Lwin, Htar Htar"},{"subitem_authors_fullname":"Lin, Kyaw Kyaw"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2020-02-28"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"978-1-7281-5925-6"},"item_title":"Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2020-03-17","publish_status":"0","recid":"4607","relation_version_is_last":true,"title":["Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:12:45.141231+00:00"}