Results 1 to 10 of about 1,030,469 (325)
Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures [PDF]
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo +2 more
doaj +7 more sources
Integrating AI in security information and event management for real time cyber defense [PDF]
The increasing frequency and sophistication of cyber-attacks have exposed significant shortcomings in conventional detection systems, emphasizing the urgent need for more advanced Cyber Threat Intelligence (CTI) capabilities.
Salman Khan +4 more
doaj +5 more sources
Contemporary culture presents a substantial obstacle for cyber security experts in the shape of software vulnerabilities, which, if taken advantage of, can jeopardize the Confidentiality, Integrity, and Availability (CIA) of any system.
Gyana Ranjana Panigrahi +6 more
doaj +3 more sources
Agentless Approach for Security Information and Event Management in Industrial IoT [PDF]
The Internet of Things (IoT) provides ease of real-time communication in homes, industries, health care, and many other dependable and interconnected sectors.
Huma Zahid +3 more
openalex +2 more sources
Secured Access Control in Security Information and Event Management Systems
Nowadays, Security Information and Event Management (SIEM) is very important in software. SIEM stores and monitors events in software and unauthorized access to logs can prompt different security threats such as information leakage and violation of ...
Leila Rikhtechi +2 more
openalex +2 more sources
Overview of Security Information and Event Management Systems [PDF]
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj +2 more sources
This work integrates logical and physical security processes, and simplifies the manageability of the security infrastructure. The process increases visibility to resources, which makes it easier to prevent security incidents, and provides a platform to ...
Akhigbe-mudu Thursday Ehis
openalex +3 more sources
A Component-Based Approach for Securing Indoor Home Care Applications [PDF]
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly ...
Aitor Agirre +3 more
doaj +5 more sources
Possibilistic Information Flow Control for Workflow Management Systems [PDF]
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Thomas Bauereiss, Dieter Hutter
doaj +4 more sources
Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj +3 more sources

