Publication | Closed Access
Application of the JDL data fusion process model for cyber security
48
Citations
13
References
2010
Year
EngineeringInformation SecuritySecurity AssessmentSoftware EngineeringCyber Security EngineeringData Fusion ProcessesIntrusion Detection SystemsSecurity ModellingData ScienceSystems EngineeringData IntegrationData ManagementIndustrial InformaticsDecision FusionIntrusion Detection SystemData FusionComputer ScienceData SecurityIntrusion DetectionCyber SecurityCybersecurity SystemSecurity Measurement
A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.
| Year | Citations | |
|---|---|---|
Page 1
Page 1