Personal information

Activities

Works (3)

Poster: M 2 ASK: A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&CK Mapping

2024-12-02 | Conference paper
Contributors: Qiaoran Meng; Nay Oo; Yuning Jiang; Hoon Wei Lim; Biplab Sikdar
Source: check_circle
Crossref

Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review

International Journal of Critical Infrastructure Protection
2024-09 | Journal article
Contributors: Yuning Jiang; Manfred A. Jeusfeld; Michael Mosaad; Nay Oo
Source: check_circle
Crossref

POSTER: Security Logs Graph Analytics for Industry Network System

2023-07-10 | Conference paper
Contributors: Qiaoran Meng; Nay Oo; Hoon Wei Lim; Biplab Sikdar
Source: check_circle
Crossref