Konferans bildirisi Açık Erişim
Yurekten, Ozgur; Demirci, Mehmet
{
"conceptdoi": "10.81043/aperta.98362",
"conceptrecid": "98362",
"created": "2021-03-16T13:56:54.929585+00:00",
"doi": "10.81043/aperta.98363",
"files": [
{
"bucket": "f62b06db-68fa-43e4-a240-7090ba85953e",
"checksum": "md5:cef8a26b48491d28688a1a00d5087dfe",
"key": "bib-b5e4ac0a-af36-4af3-a888-15187390fecd.txt",
"links": {
"self": "https://aperta.ulakbim.gov.tr/api/files/f62b06db-68fa-43e4-a240-7090ba85953e/bib-b5e4ac0a-af36-4af3-a888-15187390fecd.txt"
},
"size": 156,
"type": "txt"
}
],
"id": 98363,
"links": {
"badge": "https://aperta.ulakbim.gov.tr/badge/doi/10.81043/aperta.98363.svg",
"bucket": "https://aperta.ulakbim.gov.tr/api/files/f62b06db-68fa-43e4-a240-7090ba85953e",
"conceptbadge": "https://aperta.ulakbim.gov.tr/badge/doi/10.81043/aperta.98362.svg",
"conceptdoi": "https://doi.org/10.81043/aperta.98362",
"doi": "https://doi.org/10.81043/aperta.98363",
"html": "https://aperta.ulakbim.gov.tr/record/98363",
"latest": "https://aperta.ulakbim.gov.tr/api/records/98363",
"latest_html": "https://aperta.ulakbim.gov.tr/record/98363"
},
"metadata": {
"access_right": "open",
"access_right_category": "success",
"communities": [
{
"id": "tubitak-adresli-yayinlar"
}
],
"creators": [
{
"name": "Yurekten, Ozgur"
},
{
"affiliation": "Gazi Univ, Muhendisl Fak, Bilgisayar Muhendisligi, Ankara, Turkey",
"name": "Demirci, Mehmet"
}
],
"description": "As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks. A flexible and agile network architecture is required in order to determine and deploy countermeasures quickly. Software-defined networks facilitate timely application of cyber security measures thanks to their programmability. In this work, we propose a novel model for producing software-defined networking-based solutions against cyber threats and configuring networks automatically using risk analysis. We have developed a prototype implementation of the proposed model and demonstrated the applicability of the model. Furthermore, we have identified and presented future research directions in this area.",
"doi": "10.81043/aperta.98363",
"has_grant": false,
"license": {
"id": "cc-by"
},
"meeting": {
"title": "2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK)"
},
"publication_date": "2017-01-01",
"related_identifiers": [
{
"identifier": "10.81043/aperta.98362",
"relation": "isVersionOf",
"scheme": "doi"
}
],
"relations": {
"version": [
{
"count": 1,
"index": 0,
"is_last": true,
"last_child": {
"pid_type": "recid",
"pid_value": "98363"
},
"parent": {
"pid_type": "recid",
"pid_value": "98362"
}
}
]
},
"resource_type": {
"subtype": "conferencepaper",
"title": "Konferans bildirisi",
"type": "publication"
},
"title": "Using Cyber Threat Intelligence in SDN Security"
},
"owners": [
1
],
"revision": 1,
"stats": {
"downloads": 10.0,
"unique_downloads": 10.0,
"unique_views": 41.0,
"version_downloads": 10.0,
"version_unique_downloads": 10.0,
"version_unique_views": 36.0,
"version_views": 38.0,
"version_volume": 1560.0,
"views": 43.0,
"volume": 1560.0
},
"updated": "2021-03-16T13:56:54.989890+00:00"
}
| Görüntülenme | 43 |
| İndirme | 10 |
| Veri hacmi | 1.6 kB |
| Tekil görüntülenme | 41 |
| Tekil indirme | 10 |