Results 11 to 20 of about 922,242 (322)

Adaptive Monitoring of Companies' Information Security [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes
Valerii Lakhno   +6 more
doaj   +4 more sources

Possibilistic Information Flow Control for Workflow Management Systems [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Thomas Bauereiss, Dieter Hutter
doaj   +4 more sources

A Component-Based Approach for Securing Indoor Home Care Applications [PDF]

open access: yesSensors, 2017
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly ...
Aitor Agirre   +3 more
doaj   +5 more sources

ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX

open access: hybridCyber Security dan Forensik Digital, 2019
Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of a region.
Citra Arfanudin   +2 more
openalex   +3 more sources

Security Information Event Management data acquisition and analysis methods with machine learning principles

open access: goldResults in Engineering
In the face of increasing global disruptions, the cybersecurity field is confronting rising threats posed by offensive groups and individual hackers. Traditional security measures often fall short in detecting and mitigating these sophisticated attacks ...
Noyan Tendikov   +6 more
doaj   +2 more sources

Comparative Analysis of IBM Qradar and Wazuh for Security Information and Event Management [PDF]

open access: gold, 2023
The idea for this paper was to compare two leading SIEM tools - the commercial IBM QRadar SIEM versus Wazuh, an open-source security solution. The topic was chosen to see whether these two tools can satisfy the security requirements in a typical IT infrastructure.
Dario Suskalo   +3 more
openalex   +2 more sources

GraphBAD: A general technique for anomaly detection in security information and event management [PDF]

open access: greenConcurrency and Computation: Practice and Experience, 2018
SummaryThe reliance on expert knowledge—required for analysing security logs and performing security audits—has created an unhealthy balance, where many computer users are not able to correctly audit their security configurations and react to potential security threats. The decreasing cost of IT and the increasing use of technology in domestic life are
Simon Parkinson   +3 more
openalex   +3 more sources

A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats [PDF]

open access: yesSensors
Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric
Tuba Arif, Byunghyun Jo, Jong Hyuk Park
doaj   +2 more sources

Model of security information and event management system

open access: goldVestnik of Astrakhan State Technical University. Series: Management, computer science and informatics, 2020
The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system. This model is a formalized analytical description (in terms of a Markov chain in the form of stochastic differential equations) of the dynamics of the changing states of quality indicators ...
Igor Kotenko, Igor Parashchuk
openalex   +3 more sources

XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments [PDF]

open access: hybrid, 2014
XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data.
Bishoy Moussa   +2 more
openalex   +6 more sources

Home - About - Disclaimer - Privacy