Results 1 to 10 of about 53,613 (192)
Relations between information science and information security culture
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj +1 more source
HIERARCHICAL TEMPORAL MEMORIES IN SECURITY INFORMATION AND EVENTS MANAGEMENT SYSTEMS
Mihail Cazacu, Constanţa-Nicoleta Bodea
openalex +2 more sources
PROBLEMS OF EFFECTIVE ASSESSMENT OF INFORMATION SECURITY EVENTS IN THE ROCKET AND SPACE INDUSTRY
Background. The organization of the information security incident management process is a very important aspect of the information security system design.
V.A. Selifanov +3 more
doaj +1 more source
Current research on smart cities is primarily focused on the area of applicability of information and communication technologies. However, in the context of a multidisciplinary approach, it is also necessary to pay attention to the resilience and ...
Martin Hromada +3 more
doaj +1 more source
Research on security risk assessment mechanism of important event based on multi-source data
In order to effectively assess all types of security risks in the important event, the important decision-making basis for security risk warning and emergency management of important event is provided by analyzing the coupling relationship and evolution ...
Qilei Wang
doaj +1 more source
Classification of Modern Security Information and Event Management Systems
Dmitry Rybolovlev +2 more
openalex +2 more sources
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj +1 more source
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning
The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security.
Muhammad Arsalan Paracha +4 more
doaj +1 more source
Using Financial Instruments to Transfer the Information Security Risks
For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event.
Pankaj Pandey, Einar Snekkenes
doaj +1 more source
The paper addresses the development of technology for controlling access to digital portals and platforms based on assessments of personal characteristics of user behavior built into the interface.
S. G. Magomedov +2 more
doaj +1 more source

