Parul University
References

Here are the references for the OpenArmor project report conversion:

  1. Introduction

    • No specific references provided.
  2. Literature Survey

    • Miano, S., Risso, F., Bernal, M. V., Bertrone, M., & Lu, Y. (2021). A framework for eBPF-based network functions in an era of microservices. IEEE Transactions on Network and Service Management, 18(1), 133-151.
    • Luo, N., Du, X., He, Y., Jiang, J., Wang, X., Jiang, Z., & Zhang, K. (2021, May). A framework for document-level cybersecurity event extraction from open source data. In 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD) (pp. 422-427). IEEE.
    • Dhakate, S., & Godbole, A. (2015, December). Distributed cloud monitoring using Docker as next generation container virtualization technology. In 2015 Annual IEEE India Conference (INDICON) (pp. 1-5). IEEE.
    • Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2(3), 173.
    • Gomez, M. A., & Whyte, C. (2022). Unpacking strategic behavior in cyberspace: a schema-driven approach. Journal of Cybersecurity, 8(1), tyac005.
    • Butler, C., Thompson, G., Hsieh, G., Hoppa, M. A., & Nauer, K. S. (2018). Developing a UI and Automation Framework for a Cybersecurity Research and Experimentation Environment. In Proceedings of the International Conference on Security and Management (SAM) (pp. 208-213). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
    • Satyapanich, T., Finin, T., & Ferraro, F. (2019, December). Extracting rich semantic information about cybersecurity events. In 2019 IEEE International Conference on Big Data (Big Data) (pp. 5034-5042). IEEE.
    • Repetto, M., Striccoli, D., Piro, G., Carrega, A., Boggia, G., & Bolla, R. (2021). An autonomous cybersecurity framework for next-generation digital service chains. Journal of Network and Systems Management, 29(4), 37.
    • Tall, A. M., Zou, C. C., & Wang, J. (2021, November). Integrating Cybersecurity Into a Big Data Ecosystem. In MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM) (pp. 69-76). IEEE.
    • Takahashi, T., Panta, B., Kadobayashi, Y., & Nakao, K. (2018). Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information. International Journal of Communication Systems, 31(3), e3470.
  3. Software Requirements Specification (SRS)

    • No specific references provided.
  4. Methodology

    • No specific references provided.
  5. Implementation

    • No specific references provided.
  6. Conclusion

    • No specific references provided.
  7. Future Work

    • No specific references provided.

Rx

eBPF ( EmBeded Packet Filtering )

ocsf ( Open Cyber Security Framework )

Linux (The Liberation Station: Open-Source Freedom OS)

macOS ( The Golden Cage: Premium OS )

Windows ( The Glitchy Maze: Mandatory Updates OS )

🦀 Rust ( The Metalhead's Dream: Safe and Fast Systems Programming )

🐍 Python ( The Serpent's Charm: Versatile and Beginner-Friendly Programming )

The Python Language Reference 2.6 (opens in a new tab)

Python (programming language) (opens in a new tab)

The Python Language Reference 3.9 (opens in a new tab)

PYTHON: A PROGRAMMING LANGUAGE FOR SOFTWARE INTEGRATION AND DEVELOPMENT (opens in a new tab)

Programming in Python 3: A Complete Introduction to the Python Language (opens in a new tab)

Python – The Fastest Growing Programming Language (opens in a new tab)