http://www.isaca.org/cyber/PublishingImages/ Cybersecurity-Skills-Gap-1500.jpg (access date 03, p.3, 2017. ,
Application of Big Data, Fast Data, and Data Lake Concepts to Information Security Issues, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp.148-153, 2016. ,
DOI : 10.1109/W-FiCloud.2016.41
Security operation center concepts & implementation, 2005. ,
Security Operations Centers for Information Security Incident Management Vienna (Austria), Proceedings of the 4th International Conference, pp.131-138, 2016. ,
Applied network security monitoring: collection, detection, and analysis ,
Practice of network security monitoring, 2013. ,
What is Security Intelligence and why does it matter today? URL: https://securityintelligence.com/what-is-security-intelligence-and-why-does-it-mattertoday ,
Intelligence-driven computer network defense informed by analysis of adversary campaigns and Intrusion Kill Chains ,
Prevent fraud Achieve compliance. Preserve security URL: https://www.sas.com/en_us/software/fraud-security-intelligence.html (access date 03, p.3, 2017. ,
SIC: the difference of an Intelligence Driven Defense® Solution. A White Paper Presented by: Lockheed Martin Corporation, 2015. ,
Developing an Undergraduate Lab for Information Warfare and Computer Security, Proceeding of the IFIP TC11 WG11.8 First World Conference on Information Security Education, pp.163-170, 1999. ,
The Virtual Campus, Proceeding of the IFIP TC11 WG11.8 Second World Conference on Information Security Education. 12-14, pp.161-168, 2001. ,
Action Learning in Practice: Pilot delivery of an INFOSEC University laboratory course, Proceeding of the IFIP TC11 WG11.8 Second World Conference on Information Security Education, pp.12-14, 2001. ,
Information assurance laboratory innovations, Proceedings of the 7th Colloquium for Information Systems Security Education, 2003. ,
Network Security Scientific and Research Laboratory, Proceedings of the 3st World Conference on Information Security Education WISE3, 2003. ,
DOI : 10.1007/978-0-387-35694-5_22
Practical Studying of Wi-Fi Network Vulnerabilities|, Proceedings of the 3rd International Conference DIPDMWC2016. 1st International Workshop on Education for Secure Digital Information Processing, Data Mining and Wireless Communications (ESDIPDMWC2016), pp.227-232, 2016. ,
DOI : 10.1109/dipdmwc.2016.7529394
Using Virtualization to Create and Deploy Computer Security Lab Exercises, Proceeding of 6 th World Conference on Information Security Education (WISE6). IFIP, 2010. ,
Information Security Theory for the Future Internet Rome (Italy Magic Quadrant for Organization Network Firewalls 2015, Proceedings of the 3rd international conference «Future Internet of Things and Cloud» Network-Firewalls.pdf (access date 03.03, pp.24-26, 2015. ,