IBM Journal of Research and Development

Issue 4 • July-Aug. 2016

Security Intelligence

Cybersecurity is an extremely important challenge, and the inadequacy of perimeter-based security controls in protecting enterprises is demonstrated in the increase in the scale, scope, and frequency of cyberattacks confronting enterprises today. In this issue of the IBM Journal of Research and Development, the authors exploit a variety of instrumentation in today's IT landscape and data centers to enable the responsible collection and aggregation of sensitive monitoring data. Furthermore, authors investigate the harnessing of big data analytics engines and platforms, including cognitive computing techniques, to develop models and predictive analytics to create semantically rich interpretations of security-relevant events that scale to large environments, enabling cross-data-flow correlation of security, application, user, system, and network events.

Filter Results

Displaying Results 1 - 17 of 17

Aims & Scope

Meet Our Editors

Rachel D'Annucci Henriquez
IBM T. J. Watson Research Center