An Analysis and Implementation of Methods for High Speed Lexical Classification of Malicious URLs
- Authors: Egan, Shaun P , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429757 , vital:72637 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/58_ResearchInProgress.pdf
- Description: Several authors have put forward methods of using Artificial Neural Networks (ANN) to classify URLs as malicious or benign by using lexical features of those URLs. These methods have been compared to other methods of classification, such as blacklisting and spam filtering, and have been found to be as accurate. Early attempts proved to be as highly accurate. Fully featured classifications use lexical features as well as lookups to classify URLs and include (but are not limited to) blacklists, spam filters and reputation services. These classifiers are based on the Online Perceptron Model, using a single neuron as a linear combiner and used lexical features that rely on the presence (or lack thereof) of words belonging to a bag-of-words. Several obfuscation resistant features are also used to increase the positive classification rate of these perceptrons. Examples of these include URL length, number of directory traversals and length of arguments passed to the file within the URL. In this paper we describe how we implement the online perceptron model and methods that we used to try to increase the accuracy of this model through the use of hidden layers and training cost validation. We discuss our results in relation to those of other papers, as well as other analysis performed on the training data and the neural networks themselves to best understand why they are so effective. Also described will be the proposed model for developing these Neural Networks, how to implement them in the real world through the use of browser extensions, proxy plugins and spam filters for mail servers, and our current implementation. Finally, work that is still in progress will be described. This work includes other methods of increasing accuracy through the use of modern training techniques and testing in a real world environment.
- Full Text:
- Date Issued: 2012
Building a Graphical Fuzzing Framework
- Authors: Zeisberger, Sascha , Irwin, Barry V W
- Date: 2012
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429772 , vital:72638 , https://digifors.cs.up.ac.za/issa/2012/Proceedings/Research/59_ResearchInProgress.pdf
- Description: Fuzz testing is a robustness testing technique that sends malformed data to an application’s input. This is to test an application’s behaviour when presented with input beyond its specification. The main difference between traditional testing techniques and fuzz testing is that in most traditional techniques an application is tested according to a specification and rated on how well the application conforms to that specification. Fuzz testing tests beyond the scope of a specification by intelligently generating values that may be interpreted by an application in an unintended manner. The use of fuzz testing has been more prevalent in academic and security communities despite showing success in production environments. To measure the effectiveness of fuzz testing, an experiment was conducted where several publicly available applications were fuzzed. In some instances, fuzz testing was able to force an application into an invalid state and it was concluded that fuzz testing is a relevant testing technique that could assist in developing more robust applications. This success prompted a further investigation into fuzz testing in order to compile a list of requirements that makes an effective fuzzer. The aforementioned investigation assisted in the design of a fuzz testing framework, the goal of which is to make the process more accessible to users outside of an academic and security environment. Design methodologies and justifications of said framework are discussed, focusing on the graphical user interface components as this aspect of the framework is used to increase the usability of the framework.
- Full Text:
- Date Issued: 2012
1H NMR-based kinetic-mechanistic study of the intramolecular trans-esterification of 2-exo-3-exo-dihydroxybornane monoacrylate esters
- Authors: Duggan, Andrew R , Mciteka, Lulama P , Lobb, Kevin A , Kaye, Perry T
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/448871 , vital:74767 , xlink:href="https://hdl.handle.net/10520/EJC135616"
- Description: A 1H NMR study of the acid-catalyzed, intramolecular trans-esterification between isomeric 2-exo-3-exo-dihydroxybornane monoacrylate esters has afforded insights into the reaction mechanism and permitted the determination of kinetic and thermodynamic parameters for the pseudo-first-order processes.
- Full Text:
- Date Issued: 2013
A baseline study of potentially malicious activity across five network telescopes
- Authors: Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429714 , vital:72634 , https://ieeexplore.ieee.org/abstract/document/6568378
- Description: +This paper explores the Internet Background Radiation (IBR) observed across five distinct network telescopes over a 15 month period. These network telescopes consisting of a /24 netblock each and are deployed in IP space administered by TENET, the tertiary education network in South Africa covering three numerically distant /8 network blocks. The differences and similarities in the observed network traffic are explored. Two anecdotal case studies are presented relating to the MS08-067 and MS12-020 vulnerabilities in the Microsoft Windows platforms. The first of these is related to the Conficker worm outbreak in 2008, and traffic targeting 445/tcp remains one of the top constituents of IBR as observed on the telescopes. The case of MS12-020 is of interest, as a long period of scanning activity targeting 3389/tcp, used by the Microsoft RDP service, was observed, with a significant drop on activity relating to the release of the security advisory and patch. Other areas of interest are highlighted, particularly where correlation in scanning activity was observed across the sensors. The paper concludes with some discussion on the application of network telescopes as part of a cyber-defence solution.
- Full Text:
- Date Issued: 2013
A capability approach: Its potential for transformative education research focusing on education for sustainable development and gender issues in science teacher education
- Authors: Chikunda, Charles
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/387120 , vital:68208 , xlink:href="https://www.ajol.info/index.php/sajee/article/view/122266"
- Description: In this article, I use the capability approach to explore the role that the science, mathematics and technical subjects (SMTs) teacher education curriculum can play as a ‘gender conversion factor’. This comes amidst evidence that a major hindrance to the participation of girls in these disciplines is a lack of gender responsiveness in the pedagogy applied in schools. Seven teacher educators, who were purposively sampled at a Technical Teachers’ College in Zimbabwe, were the research participants. I adopted a case study design in which I used in-depth interviews, focus-group discussions and document analysis to generate data. Data was analysed deductively using predetermined themes based on an analytical tool anchored on Sen’s two, but quite distinct, aspects of freedom, that is, the opportunity aspect and the process aspect of freedom. The findings reveal that there is a limited awareness of gender issues among teacher educators, and that these issues are not being transformed into curriculum practice. All in all, it is evident that curriculum practices of SMTs teacher educators are riddled with gender blindness and so trainee teachers graduate from college without the necessary agency to deal with personal, social and environmental conversion factors that can play a role in girls converting the curriculum into functionings (beings and doings) and wider freedoms and valued beings and doings (capabilities).
- Full Text:
- Date Issued: 2013
A high-level architecture for efficient packet trace analysis on gpu co-processors
- Authors: Nottingham, Alastair , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429572 , vital:72623 , 10.1109/ISSA.2013.6641052
- Description: This paper proposes a high-level architecture to support efficient, massively parallel packet classification, filtering and analysis using commodity Graphics Processing Unit (GPU) hardware. The proposed architecture aims to provide a flexible and efficient parallel packet processing and analysis framework, supporting complex programmable filtering, data mining operations, statistical analysis functions and traffic visualisation, with minimal CPU overhead. In particular, this framework aims to provide a robust set of high-speed analysis functionality, in order to dramatically reduce the time required to process and analyse extremely large network traces. This architecture derives from initial research, which has shown GPU co-processors to be effective in accelerating packet classification to up to tera-bit speeds with minimal CPU overhead, far exceeding the bandwidth capacity between standard long term storage and the GPU device. This paper provides a high-level overview of the proposed architecture and its primary components, motivated by the results of prior research in the field.
- Full Text:
- Date Issued: 2013
A kernel-driven framework for high performance internet routing simulation
- Authors: Herbert, Alan , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429585 , vital:72624 , 10.1109/ISSA.2013.6641048
- Description: The ability to provide the simulation of packets traversing an internet path is an integral part of providing realistic simulations for network training, and cyber defence exercises. This paper builds on previous work, and considers an in-kernel approach to solving the routing simulation problem. The inkernel approach is anticipated to allow the framework to be able to achieve throughput rates of 1GB/s or higher using commodity hardware. Processes that run outside the context of the kernel of most operating system require context switching to access hardware and kernel modules. This leads to considerable delays in the processes, such as network simulators, that frequently access hardware such as hard disk accesses and network packet handling. To mitigate this problem, as experienced with earlier implementations, this research looks towards implementing a kernel module to handle network routing and simulation within a UNIX based system. This would remove delays incurred from context switching and allows for direct access to the hardware components of the host.
- Full Text:
- Date Issued: 2013
A source analysis of the conficker outbreak from a network telescope.
- Authors: Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429742 , vital:72636 , 10.23919/SAIEE.2013.8531865
- Description: This paper discusses a dataset of some 16 million packets targeting port 445/tcp collected by a network telescope utilising a /24 netblock in South African IP address space. An initial overview of the collected data is provided. This is followed by a detailed analysis of the packet characteristics observed, including size and TTL. The peculiarities of the observed target selection and the results of the flaw in the Conficker worm's propagation algorithm are presented. An analysis of the 4 million observed source hosts is reported, grouped by both packet counts and the number of distinct hosts per network address block. Address blocks of size /8, 16 and 24 are used for groupings. The localisation, by geographic region and numerical proximity, of high ranking aggregate netblocks is highlighted. The observed shift in geopolitical origins observed during the evolution of the Conficker worm is also discussed. The paper concludes with some overall analyses, and consideration of the application of network telescopes to the monitoring of such outbreaks in the future.
- Full Text:
- Date Issued: 2013
A study of the photophysicochemical and antimicrobial properties of two zinc phthalocyanine–silver nanoparticle conjugates
- Authors: Rapulenyane, Nomasonto , Antunes, Edith M , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/232522 , vital:49999 , xlink:href="https://doi.org/10.1039/C3NJ41107A"
- Description: This work reports conjugation of two mono carboxy substituted zinc phthalocyanines with glutathione capped silver nanoparticles (GSH-AgNPs). The photophysicochemical behaviour of the novel phthalocyanines–silver nanoparticle conjugates was investigated together with simple mixtures of the silver nanoparticles with low symmetry phthalocyanines (i.e. with no direct chemical bond formation). It was observed that upon conjugation of the phthalocyanines to the silver nanoparticles, a blue shifting of the Q band was induced. The triplet lifetimes and quantum yields improved upon conjugation as compared to the phthalocyanines alone. Fluorescence lifetimes and quantum yields decreased for conjugates compared to the phthalocyanines alone due to quenching caused by the silver nanoparticles. The low symmetry phthalocyanines and their conjugates showed antimicrobial activity against Escherichia coli in the presence and absence of light.
- Full Text:
- Date Issued: 2013
Adsorption and separation of platinum and palladium by polyamine functionalized polystyrene-based beads and nanofibers
- Authors: Fayemi, Omolola E , Ogunlaja, Adeniyi S , Kempgens, Pierre F M , Antunes, Edith M , Torto, Nelson , Nyokong, Tebello , Tshentu, Zenixole R
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/241694 , vital:50961 , xlink:href="https://doi.org/10.1016/j.mineng.2013.06.006"
- Description: Adsorption and separation of platinum and palladium chlorido species (PtCl62- and PdCl42-) on polystyrene beads as well as nanofibers functionalized with ammonium centres based on ethylenediamine (EDA), diethylenetriamine (DETA), triethylenetetramine (TETA) and tris-(2-aminoethyl)amine (TAEA) are described. The functionalized sorbent materials were characterized by microanalysis, SEM, XPS, BET and FTIR. The surface area of the functionalized fibers was in the range 69–241 m2/g while it was 73–107 m2/g for the beads. The adsorption and loading capacities of the sorption materials were investigated using both the batch and column studies at 1 M HCl concentration. The adsorption studies for both PtCl62- and PdCl42- on the different sorbent materials fit the Langmuir isotherm with R2 values >0.99. The highest loading capacity of Pt and Pd were 7.4 mg/g and 4.3 mg/g respectively for the nanofiber sorbent material based on ethylenediamine (EDA) while the beads with ethylenediamine (EDA) gave 1.0 mg/g and 0.2 mg/g for Pt and Pd respectively. Metals loaded on the sorbent materials were recovered by using 3% m/v thiourea solution as the eluting agent with quantitative desorption efficiency under the selected experimental conditions. Separation of platinum from palladium was partially achieved by selective stripping of PtCl62- with 0.5 M of NaClO4 in 1.0 M HCl while PdCl42- was eluted with 0.5 M thiourea in 1.0 M HCl. Separation of platinum from iridium and rhodium under 1 M HCl concentration was successful on triethylenetriamine (TETA)-functionalized Merrifield beads. This material (M-TETA) showed selectivity for platinum albeit the low loading capacity.
- Full Text:
- Date Issued: 2013
Ancient and modern hybridization between Lucilia sericata and L. cuprina (Diptera: Calliphoridae)
- Authors: Williams, Kirstin A , Villet, Martin H
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/442633 , vital:74017 , 10.14411/eje.2013.029
- Description: There are important but inconsistent differences in breeding site preference between the blow flies Lucilia sericata (Meigen, 1826) and L. cuprina (Wiedemann, 1830)(Diptera: Calliphoridae) that have significance for medical and veterinary science. These inconsistencies might arise from hybridisation. The species are difficult to distinguish using external morphology, although the male genitalia are distinctive and there are reliable molecular markers. Molecular evidence of modern hybridisation, derived from a newly developed nuclear marker, the period (per) gene, is presented here. This has implications for identifications of these species based on mtDNA, and may lead to an explanation of the medical and veterinary anomalies noted in these species.
- Full Text:
- Date Issued: 2013
Applying a student curriculum discourse in higher education teaching and learning
- Authors: Mndzebele, Samuel , McKenna, Sioux
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/187417 , vital:44633 , xlink:href="https://doi.org/10.1080/18146627.2013.786210"
- Description: Indications of poor quality in students’ written work necessitated the need for deeper investigations aimed at designing and applying appropriate teaching/learning and assessment innovations in the course curriculum. The project-exercise engaged a conceptual-explorative approach through: reviews/investigations; educational diagnosis; design/application of innovations and evaluation processes. In addition to other challenges, diagnosed problems included: students’ ignorance on key curriculum components; imbalance in teaching/learning and assessment tasks engaging all 3-learning domains; less intensiveness of the e-learning mode; and superficial formative feedback. Included a “Student-Curriculum-Discourse” self-tutorial guide, and tasks alignment of the teaching/learning and assessment. Learners’ performance can be improved through a curriculum-discourse self-tutorial exercise, complemented with: intellectual, social, experiential, and emotional structures. Both educators and learners share specific responsibilities in the teaching/learning environment. There is need to expand/probe the theoretical dimension within which the on-line distance education occurs.
- Full Text:
- Date Issued: 2013
Automated classification of computer network attacks
- Authors: van Heerden, Renier , Leenen, Louise , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429622 , vital:72627 , 10.1109/ICASTech.2013.6707510
- Description: In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.
- Full Text:
- Date Issued: 2013
Axial coordination of zinc and silicon phthalocyanines to silver and gold nanoparticles: an investigation of their photophysicochemical and antimicrobial behavior
- Authors: Masilela, Nkosiphile , Antunes, Edith M , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/241818 , vital:50972 , xlink:href="https://doi.org/10.1142/S1088424613500016"
- Description: This work reports on the axial coordination of zinc phthalocyanine and bis-(1,6-hexanedithiol) silicon phthalocyanine to silver and gold nanoparticles. Red shifting of absorption spectra of the phthalocyanine complexes was observed after conjugation with the nanoparticles. An improvement in the photophysicochemical behavior and antimicrobial activity was achieved in the presence of metal nanoparticles for both complexes. A decrease in triplet lifetimes was observed for all the phthalocyanine metal nanoparticle conjugates. The Zn phthalocyanine complex gave the highest triplet and singlet oxygen quantum yield in the presence of gold nanoparticles. On the other hand, the bacterial inhibition was found to be best for the Si phthalocyanine derivative in the presence of nanoparticles compared to the Zn phthalocyanine counterpart. The highest antimicrobial activity was achieved for both conjugates against B. subtilis compared to S. aureaus both in the dark and under illumination with light.
- Full Text:
- Date Issued: 2013
Catalytic oxidation of thioanisole using oxovanadium (IV)‐functionalized electrospun polybenzimidazole nanofibers
- Authors: Walmsley, Ryan S , Hlangothi, Percy , Litwinski, Christian , Nyokong, Tebello , Torto, Nelson , Tshentu, Zenixole R
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/242083 , vital:51000 , xlink:href="https://doi.org/10.1002/app.38067"
- Description: Polybenzimidazole fibers, with an average diameter of 262 nm, were produced by the process of electrospinning. These fibers were used as a solid support material for the immobilization of oxovanadium(IV) which was achieved via a reaction with vanadyl sulfate. The oxovanadium(IV)-functionalized nanofibers were used as heterogeneous catalysts for the oxidation of thioanisole under both batch and pseudo-continuous flow conditions with great success. Under batch conditions near quantitative oxidation of thioanisole was achieved in under 90 min, even after four successive catalytic reactions. Under continuous conditions, excellent conversion of thioanisole was maintained throughout the period studied at flow rates of up to 2 mLh−1. This study, therefore, proposes that electrospun polybenzimidazole nanofibers, with their small diameters, impressive chemical and thermal stability, as well as coordinating benzimidazole group, may be a desirable support material for immobilization of homogeneous catalysts.
- Full Text:
- Date Issued: 2013
Characterisation of novel CrleGV isolates for false codling moth control-lessons learnt from codling moth resistance to CpGV. Characterisation of novel CrleGV isolates for false codling moth control-lessons learnt from codling moth resistance to CpGV
- Authors: Opoku-Debrah, John K , Moore, Sean D , Hill, Martin P , Knox, Caroline M
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/425414 , vital:72237 , xlink:href="https://www.cabdirect.org/cabdirect/abstract/20133257674"
- Description: Recently some codling moth, Cydia pomonella, populations in Europe developed resistance to CpGV. In order to prepare for the possibility of a similar occurrence with the false codling moth, Thaumatotibia leucotreta, in South Africa, a search was conducted for novel CrleGV isolates. Through overcrowding, outbreaks of novel isolates were recorded from laboratory populations of five geographically distinct host populations. The genetic novelty of these and two commercially available isolates was confirmed through restriction enzyme analysis and sequence analysis of the granulin and egt genes. Phylogenetic analysis showed the existence of two CrleGV-SA genome types. Significant differences in virulence were also shown between certain isolates against certain host populations.
- Full Text:
- Date Issued: 2013
Characterization and electrocatalytic behaviour of glassy carbon electrode modified with nickel nanoparticles towards amitrole detection
- Authors: Maringa, Audacity , Mugadza, Tawanda , Antunes, Edith M , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/241793 , vital:50970 , xlink:href="https://doi.org/10.1016/j.jelechem.2013.04.022"
- Description: We report on the synthesis of Ni nanoparticles (NiNPs) and their application in electrocatalysis in comparison with nickel phthalocyanine (NiPc). UV–vis spectroscopy, powder X-ray diffraction, transmission electron microscopy and electron paramagnetic resonance were used in the characterization of NiNPs. Cyclic voltammetry and electrochemical impedance spectroscopy were used in electrocatalytic studies of amitrole on the glassy carbon electrode modified with NiNPs. The apparent and catalytic rate constants for amitrole on the NiNP-GCE were found to be 2.58 × 10−5 cm s−1 and 1.11 × 103 M−1 s−1, respectively.
- Full Text:
- Date Issued: 2013
Characterization and photophysical behavior of phthalocyanines when grafted onto silica nanoparticles
- Authors: Fashina, Adedayo , Antunes, Edith M , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/241981 , vital:50989 , xlink:href="https://doi.org/10.1016/j.poly.2013.01.037"
- Description: This work reports on the functionalization of silica nanoparticles with zinc phthalocyanine complexes tetra-substituted non-peripherally with 4-carboxyphenoxyl and 3-carboxyphenoxyl groups. The phthalocyanine dyes have a free carboxyl group, facilitating the covalent attachment of the dyes on the silica surface via amide bond formation. The phthalocyanine functionalized silica nanoparticles showed higher fluorescence and triplet quantum yields as well as longer triplet lifetimes compared to the free phthalocyanines.
- Full Text:
- Date Issued: 2013
Characterization of glassy carbon electrodes modified with carbon nanotubes and iron phthalocyanine through grafting and click chemistry
- Authors: Coates, Megan , Nyokong, Tebello
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/193746 , vital:45392 , xlink:href="https://doi.org/10.1016/j.electacta.2012.12.112"
- Description: A glassy carbon electrode was modified by adsorption of single-walled carbon nanotubes, followed by electrochemical grafting of 4-azidobenzenediazonium salt, which was in turn reacted with ethynylpyridine through the Sharpless “click chemistry” reaction. Thereafter, iron phthalocyanine was attached to the electrode through axial ligation to the pyridine group. The modified electrode was characterised using X-ray photoelectron spectroscopy and scanning electrochemical microscopy, and well as electrochemistry. The electrocatalytic ability of the modified electrode was tested using hydrazine as a sample analyte, and showed a significant 10-fold improvement in the detection of hydrazine compared to the surface without nanotubes, and comparable stability. The linear range for this surface was over 1.0 × 10−5 to 1.0 × 10−4 mol dm−3, with a limit of detection of 1.10 ± 0.06 μmol dm−3 and sensitivity of 15.61 μA mM−1.
- Full Text:
- Date Issued: 2013
Classification of security operation centers
- Authors: Jacobs, Pierre , Arnab, Alapan , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429635 , vital:72628 , 10.1109/ISSA.2013.6641054
- Description: Security Operation Centers (SOCs) are a necessary service for organisations that want to address compliance and threat management. While there are frameworks in existence that addresses the technology aspects of these services, a holistic framework addressing processes, staffing and technology currently do not exist. Additionally, it would be useful for organizations and constituents considering building, buying or selling these services to measure the effectiveness and maturity of the provided services. In this paper, we propose a classification and rating scheme for SOC services, evaluating both the capabilities and the maturity of the services offered.
- Full Text:
- Date Issued: 2013