Results 11 to 20 of about 922,242 (322)
Adaptive Monitoring of Companies' Information Security [PDF]
Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes
Valerii Lakhno+6 more
doaj +4 more sources
Possibilistic Information Flow Control for Workflow Management Systems [PDF]
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Thomas Bauereiss, Dieter Hutter
doaj +4 more sources
A Component-Based Approach for Securing Indoor Home Care Applications [PDF]
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly ...
Aitor Agirre+3 more
doaj +5 more sources
Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of a region.
Citra Arfanudin+2 more
openalex +3 more sources
In the face of increasing global disruptions, the cybersecurity field is confronting rising threats posed by offensive groups and individual hackers. Traditional security measures often fall short in detecting and mitigating these sophisticated attacks ...
Noyan Tendikov+6 more
doaj +2 more sources
Comparative Analysis of IBM Qradar and Wazuh for Security Information and Event Management [PDF]
The idea for this paper was to compare two leading SIEM tools - the commercial IBM QRadar SIEM versus Wazuh, an open-source security solution. The topic was chosen to see whether these two tools can satisfy the security requirements in a typical IT infrastructure.
Dario Suskalo+3 more
openalex +2 more sources
GraphBAD: A general technique for anomaly detection in security information and event management [PDF]
SummaryThe reliance on expert knowledge—required for analysing security logs and performing security audits—has created an unhealthy balance, where many computer users are not able to correctly audit their security configurations and react to potential security threats. The decreasing cost of IT and the increasing use of technology in domestic life are
Simon Parkinson+3 more
openalex +3 more sources
A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats [PDF]
Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric
Tuba Arif, Byunghyun Jo, Jong Hyuk Park
doaj +2 more sources
Model of security information and event management system
The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system. This model is a formalized analytical description (in terms of a Markov chain in the form of stochastic differential equations) of the dynamics of the changing states of quality indicators ...
Igor Kotenko, Igor Parashchuk
openalex +3 more sources
XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments [PDF]
XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data.
Bishoy Moussa+2 more
openalex +6 more sources