Results 11 to 20 of about 1,030,766 (332)
Secured Access Control in Security Information and Event Management Systems
Nowadays, Security Information and Event Management (SIEM) is very important in software. SIEM stores and monitors events in software and unauthorized access to logs can prompt different security threats such as information leakage and violation of confidentiality.
Leila Rikhtechi +2 more
openalex +3 more sources
Model of security information and event management system
The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system. This model is a formalized analytical description (in terms of a Markov chain in the form of stochastic differential equations) of the dynamics of the changing states of quality indicators ...
Igor Kotenko, Igor Parashchuk
openalex +3 more sources
A Security Information and Event Management Pattern [PDF]
In order to achieve a high level of cyber security awareness most mid to large sized companies use Security Information and Event Management (SIEM) embedded into a Security Operations Center. These systems enable the centralized collection and analysis of security relevant information generated by a variety of different systems, to detect advanced ...
Manfred Vielberth, Günther Pernul
openalex +3 more sources
Improving the security level of the information system using the SSL protocol [PDF]
An important role in the organization of production sites is played by the security of information for the process of planning the management of the production site. Information security is a very important component of any information system used on the
Purchina Оlga +2 more
doaj +1 more source
PROBLEMS OF EFFECTIVE ASSESSMENT OF INFORMATION SECURITY EVENTS IN THE ROCKET AND SPACE INDUSTRY
Background. The organization of the information security incident management process is a very important aspect of the information security system design.
V.A. Selifanov +3 more
doaj +1 more source
Reactive Rules for Emergency Management [PDF]
The goal of the following survey on Event-Condition-Action (ECA) Rules is to come to a common understanding and intuition on this topic within EMILI. Thus it does not give an academic overview on Event-Condition-Action Rules which would be valuable for ...
Brodt, Simon +2 more
core +1 more source
Current research on smart cities is primarily focused on the area of applicability of information and communication technologies. However, in the context of a multidisciplinary approach, it is also necessary to pay attention to the resilience and ...
Martin Hromada +3 more
doaj +1 more source
XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments [PDF]
XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data.
El-Khouly, Mahmoud +2 more
core +3 more sources
Research on security risk assessment mechanism of important event based on multi-source data
In order to effectively assess all types of security risks in the important event, the important decision-making basis for security risk warning and emergency management of important event is provided by analyzing the coupling relationship and evolution ...
Qilei Wang
doaj +1 more source

