Results 1 to 10 of about 3,458,578 (256)

Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures [PDF]

open access: goldSensors, 2021
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo   +2 more
doaj   +11 more sources

Overview of Security Information and Event Management Systems [PDF]

open access: diamondInformatică economică
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj   +5 more sources

ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX [PDF]

open access: hybridCyber Security dan Forensik Digital, 2019
Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of ...
Citra Arfanudin   +2 more
core   +7 more sources

SPEAR SIEM: A Security Information and Event Management system for the Smart Grid

open access: hybridComputer Networks, 2021
Abstract The technological leap of smart technologies has brought the conventional electrical grid in a new digital era called Smart Grid (SG), providing multiple benefits, such as two-way communication, pervasive control and self-healing. However, this new reality generates significant cybersecurity risks due to the heterogeneous and insecure nature
Panagiotis Radoglou-Grammatikis   +16 more
semanticscholar   +4 more sources

Agentless Approach for Security Information and Event Management in Industrial IoT [PDF]

open access: goldElectronics, 2023
The Internet of Things (IoT) provides ease of real-time communication in homes, industries, health care, and many other dependable and interconnected sectors.
Huma Zahid   +3 more
semanticscholar   +3 more sources

Analysis of correlation rules in Security information and event management systems

open access: bronzeCOMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES, 2020
This article discusses the main components of information security systems and information security incident management. The methods of non-signature, as well as signature analysis of rules and decision-making that are used in such systems are considered. The analysis of existing methods of correlation rules.
Андрій Власов, V. V. Lysko
semanticscholar   +9 more sources

Secured Access Control in Security Information and Event Management Systems

open access: goldJournal of Information Systems and Telecommunication, 2021
Nowadays, Security Information and Event Management (SIEM) is very important in software. SIEM stores and monitors events in software and unauthorized access to logs can prompt different security threats such as information leakage and violation of ...
Leila Rikhtechi   +2 more
semanticscholar   +5 more sources

Possibilistic Information Flow Control for Workflow Management Systems [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Thomas Bauereiss, Dieter Hutter
doaj   +5 more sources

Security Information Event Management data acquisition and analysis methods with machine learning principles

open access: goldResults in Engineering
In the face of increasing global disruptions, the cybersecurity field is confronting rising threats posed by offensive groups and individual hackers. Traditional security measures often fall short in detecting and mitigating these sophisticated attacks ...
Noyan Tendikov   +6 more
doaj   +3 more sources

Model of security information and event management system

open access: goldVestnik of Astrakhan State Technical University. Series: Management, computer science and informatics, 2020
The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system.
Igor Kotenko, Igor Parashchuk
semanticscholar   +4 more sources

Home - About - Disclaimer - Privacy