Results 11 to 20 of about 1,030,766 (332)

Secured Access Control in Security Information and Event Management Systems

open access: goldJournal of Information Systems and Telecommunication, 2021
Nowadays, Security Information and Event Management (SIEM) is very important in software. SIEM stores and monitors events in software and unauthorized access to logs can prompt different security threats such as information leakage and violation of confidentiality.
Leila Rikhtechi   +2 more
openalex   +3 more sources

Model of security information and event management system

open access: diamondVestnik of Astrakhan State Technical University. Series: Management, computer science and informatics, 2020
The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system. This model is a formalized analytical description (in terms of a Markov chain in the form of stochastic differential equations) of the dynamics of the changing states of quality indicators ...
Igor Kotenko, Igor Parashchuk
openalex   +3 more sources

A Security Information and Event Management Pattern [PDF]

open access: green, 2018
In order to achieve a high level of cyber security awareness most mid to large sized companies use Security Information and Event Management (SIEM) embedded into a Security Operations Center. These systems enable the centralized collection and analysis of security relevant information generated by a variety of different systems, to detect advanced ...
Manfred Vielberth, Günther Pernul
openalex   +3 more sources

Improving the security level of the information system using the SSL protocol [PDF]

open access: yesE3S Web of Conferences, 2023
An important role in the organization of production sites is played by the security of information for the process of planning the management of the production site. Information security is a very important component of any information system used on the
Purchina Оlga   +2 more
doaj   +1 more source

PROBLEMS OF EFFECTIVE ASSESSMENT OF INFORMATION SECURITY EVENTS IN THE ROCKET AND SPACE INDUSTRY

open access: yesИзмерение, мониторинг, управление, контроль, 2022
Background. The organization of the information security incident management process is a very important aspect of the information security system design.
V.A. Selifanov   +3 more
doaj   +1 more source

Reactive Rules for Emergency Management [PDF]

open access: yes, 2010
The goal of the following survey on Event-Condition-Action (ECA) Rules is to come to a common understanding and intuition on this topic within EMILI. Thus it does not give an academic overview on Event-Condition-Action Rules which would be valuable for ...
Brodt, Simon   +2 more
core   +1 more source

Converged Security and Information Management System as a Tool for Smart City Infrastructure Resilience Assessment

open access: yesSmart Cities, 2023
Current research on smart cities is primarily focused on the area of applicability of information and communication technologies. However, in the context of a multidisciplinary approach, it is also necessary to pay attention to the resilience and ...
Martin Hromada   +3 more
doaj   +1 more source

XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments [PDF]

open access: yes, 2014
XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data.
El-Khouly, Mahmoud   +2 more
core   +3 more sources

Research on security risk assessment mechanism of important event based on multi-source data

open access: yesScientific Reports, 2022
In order to effectively assess all types of security risks in the important event, the important decision-making basis for security risk warning and emergency management of important event is provided by analyzing the coupling relationship and evolution ...
Qilei Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy