Publication detail

Selective Availability for Security Monitoring

KAJAN, R. ZACHARIÁŠ, M. HEROUT, A.

Original Title

Selective Availability for Security Monitoring

English Title

Selective Availability for Security Monitoring

Type

conference paper

Language

en

Original Abstract

This paper describes a system for determining selective availability of operators interacting with a large IPv6 security monitoring system.  The system is using ultra-mobile and desktop devices as the consoles operated by the security personnel.  These devices provide a number of physical and virtual sensors which are processed by a machine-learned classifier and allow for determination of the subject's availability for messages and alerts of different level of importance. The system was evaluated on a small set of skilled users in a longitudinal manner and the results are reported.

English abstract

This paper describes a system for determining selective availability of operators interacting with a large IPv6 security monitoring system.  The system is using ultra-mobile and desktop devices as the consoles operated by the security personnel.  These devices provide a number of physical and virtual sensors which are processed by a machine-learned classifier and allow for determination of the subject's availability for messages and alerts of different level of importance. The system was evaluated on a small set of skilled users in a longitudinal manner and the results are reported.

Keywords

selective availability, security monitoring, ultra-mobile devices

Released

27.03.2012

Publisher

NEUVEDEN

Location

Furtwagen

Pages from

1

Pages to

10

Pages count

10

Documents

BibTex


@inproceedings{BUT91494,
  author="Rudolf {Kajan} and Michal {Zachariáš} and Adam {Herout}",
  title="Selective Availability for Security Monitoring",
  annote="This paper describes a system for determining selective availability of operators
interacting with a large IPv6 security monitoring system.  The system is using
ultra-mobile and desktop devices as the consoles operated by the security
personnel.  These devices provide a number of physical and virtual sensors which
are processed by a machine-learned classifier and allow for determination of the
subject's availability for messages and alerts of different level of importance.
The system was evaluated on a small set of skilled users in a longitudinal manner
and the results are reported.",
  address="NEUVEDEN",
  booktitle="Proceedings of the Software Technologies and Processes 2012",
  chapter="91494",
  edition="NEUVEDEN",
  howpublished="print",
  institution="NEUVEDEN",
  year="2012",
  month="march",
  pages="1--10",
  publisher="NEUVEDEN",
  type="conference paper"
}