• Publications
  • Influence
Alarm correlation
TLDR
The authors discuss the development of an alarm correlation model and a corresponding software support system that allow efficient specification of alarm correlation by the domain experts themselves. Expand
  • 294
  • 11
  • PDF
Mission cyber security situation assessment using impact dependency graphs
  • G. Jakobson
  • Computer Science
  • 14th International Conference on Information…
  • 5 July 2011
TLDR
The paper proposes a conceptual framework and a method for assessing impact that cyber attacks might have to cyber assets, services, and missions. Expand
  • 77
  • 9
  • PDF
A Framework of Cognitive Situation Modeling and Recognition
TLDR
This paper scopes the issues of situation management in dynamic systems, defines the basic concepts, and identifies several key enabling technologies. Expand
  • 42
  • 6
Event Correlation in Integrated Management: Lessons Learned and Outlook
TLDR
We try to capture the main lessons learned by the integrated management community in event correlation in the past 25 years, and to identify important challenges that we are faced with. Expand
  • 42
  • 6
Real-time telecommunication network management: extending event correlation with temporal constraints
TLDR
We expand our knowledge-based event correlation model to capture temporal constraints and apply it to network surveillance. Expand
  • 126
  • 4
Multi-Agent Situation Management for Supporting Large-Scale Disaster Relief Operations
Natural and human-made disasters create unparalleled challenges to Disaster Situation Management. We describe two important information technology solutions meeting these challenges: distributedExpand
  • 20
  • 2
  • PDF
Situation Management: Basic Concepts and Approaches
TLDR
This paper scopes the issues of Situation Management in dynamic systems, defines the basic concepts of the Situation Management, and identifies several key enabling technologies. Expand
  • 42
  • 1
Insider threat detection using situation-aware MAS
TLDR
We describe our distributed architecture for insider threat detection based on our earlier work in situation-aware BDI agents. Expand
  • 28
  • 1
  • PDF
Mission-centricity in cyber security: Architecting cyber attack resilient missions
  • G. Jakobson
  • Computer Science
  • 5th International Conference on Cyber Conflict…
  • 4 June 2013
TLDR
We show that mission cyber attack resilience is achieved through emergent (collective and adaptive) behavior of IT infrastructure components and missions. Expand
  • 19
  • 1
  • PDF
Extending situation modeling with inference of plausible future cyber situations
  • G. Jakobson
  • Computer Science
  • IEEE International Multi-Disciplinary Conference…
  • 21 April 2011
TLDR
A novel approach of inferring plausible future cyber security situations, based on several key elements, including temporal fuzzy situations, the principal of plausible future situations, cyber terrain, and impact dependency graph. Expand
  • 20
  • 1