Results 1 to 10 of about 1,030,766 (332)

Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures [PDF]

open access: goldSensors, 2021
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo   +2 more
doaj   +7 more sources

Overview of Security Information and Event Management Systems [PDF]

open access: diamondInformatică economică
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj   +3 more sources

Integrating AI in security information and event management for real time cyber defense [PDF]

open access: goldScientific Reports
The increasing frequency and sophistication of cyber-attacks have exposed significant shortcomings in conventional detection systems, emphasizing the urgent need for more advanced Cyber Threat Intelligence (CTI) capabilities.
Salman Khan   +4 more
doaj   +4 more sources

A Component-Based Approach for Securing Indoor Home Care Applications [PDF]

open access: yesSensors, 2017
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly ...
Aitor Agirre   +3 more
doaj   +5 more sources

Analytical Validation and Integration of CIC-Bell-DNS-EXF-2021 Dataset on Security Information and Event Management

open access: goldIEEE Access
Contemporary culture presents a substantial obstacle for cyber security experts in the shape of software vulnerabilities, which, if taken advantage of, can jeopardize the Confidentiality, Integrity, and Availability (CIA) of any system.
Gyana Ranjana Panigrahi   +6 more
doaj   +2 more sources

Possibilistic Information Flow Control for Workflow Management Systems [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Thomas Bauereiss, Dieter Hutter
doaj   +4 more sources

Adaptive Monitoring of Companies' Information Security [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes
Valerii Lakhno   +6 more
doaj   +1 more source

Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web

open access: yesJournal of Information and Technology, 2023
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj   +1 more source

The factor of the risk and risk management In information security

open access: yesХабаршы. Заң сериясы, 2021
Risk is the consequence of events and dangers. To rephrase it, an event that will cause damage and deprivation and this happening can be described via the term of information. The word risk means foreseeable dangers or being under the threat of possible
A. N. Ibrahimova
doaj   +3 more sources

Relations between information science and information security culture

open access: yesJournal of Modern Science, 2023
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj   +1 more source

Home - About - Disclaimer - Privacy