skip to main content
Volume 24, Issue 3August 2024Current IssueIssue-in-Progress
Reflects downloads up to 04 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Open Access
Towards Human-AI Teaming to Mitigate Alert Fatigue in Security Operations Centres
Article No.: 12, Pages 1–22https://doi.org/10.1145/3670009

Security Operations Centres (SOCs) play a pivotal role in defending organisations against evolving cyber threats. They function as central hubs for detecting, analysing, and responding promptly to cyber incidents with the primary objective of ensuring the ...

research-article
RESP: A Recursive Clustering Approach for Edge Server Placement in Mobile Edge Computing
Article No.: 13, Pages 1–25https://doi.org/10.1145/3666091

With the rapid advancement of the Internet of Things and 5G networks in smart cities, the inevitable generation of massive amounts of data, commonly known as big data, has introduced increased latency within the traditional cloud computing paradigm. In ...

research-article
Open Access
Using Reinforcement Learning and Error Models for Drone Precise Landing
Article No.: 14, Pages 1–30https://doi.org/10.1145/3670997

We propose a novel framework for achieving precision landing in drone services. The proposed framework consists of two distinct decoupled modules, each designed to address a specific aspect of landing accuracy. The first module is concerned with intrinsic ...

research-article
Open Access
OTI-IoT: A Blockchain-based Operational Threat Intelligence Framework for Multi-vector DDoS Attacks
Article No.: 15, Pages 1–31https://doi.org/10.1145/3664287

The Internet of Things (IoT) refers to a complex network comprising interconnected devices that transmit their data via the Internet. Due to their open environment, limited computation power, and absence of built-in security, IoT environments are ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.