{"componentChunkName":"component---src-templates-blog-list-blog-list-js","path":"/blog/page/5","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"frontmatter":{"categories":["project"],"title":"Collaborative Cyber Common Operating Picture","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"collaborative-cyber-common-operating-picture","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"Common Operational Pictures (COPs) have been used in the military domain as a powerful tool for gaining Situational Awareness (SA) and thus…"}},{"node":{"frontmatter":{"categories":["project"],"title":"Metrics Recommendation for Cyber Common Operating Picture","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"metrics-recommendation-for-cyber-common-operating-picture","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"Cyber Common Operating Picture (CCOP) comprises security metrics that reflect the cyber-health of an organization with respect to its…"}},{"node":{"frontmatter":{"categories":["project"],"title":"AI Assistant for Cyber Common Operating Picture","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":null},"fields":{"slug":"ai-assistant-for-cyber-common-operating-picture","authorId":null,"dateSlug":"2020-07-01"},"excerpt":"Cyber Common Operating Picture (CCOP) comprises a set of metrics, coming from different security intelligence sources. One of the current…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Secure Mobile Health Application Engineering","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"secure-mobile-health-application-engineering","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Secure Mobile Health Application Engineering Smartphone ownership has surpassed three billion, and it is expected to increase by several…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Security, Architecture and Platforms for Distributed Autonomous Systems","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"security-architecture-and-platforms-for-distributed-autonomous-systems","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Security, Architecture and Platforms for Distributed Autonomous Systems In this area of research, we devise and implement (i) security…"}},{"node":{"frontmatter":{"categories":["research topic","cyber security"],"title":"Security Orchestration and Automation","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"July 1, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"security-orchestration-and-automation","authorId":"owen-christ","dateSlug":"2020-07-01"},"excerpt":"Security Orchestration and Automation At CREST researchers are leveraging existing software engineering, analytical reasoning, natural…"}}]}},"pageContext":{"limit":6,"skip":24,"currentPage":5,"numberOfPages":7,"breadcrumb":{"location":"/blog/page/5","crumbs":[{"pathname":"/","crumbLabel":"Home"},{"pathname":"/blog","crumbLabel":"blog"},{"pathname":"/blog/page","crumbLabel":"page"},{"pathname":"/blog/page/5","crumbLabel":"5"}]}}}}