Results 11 to 20 of about 1,030,469 (325)

Security Information Event Management data acquisition and analysis methods with machine learning principles

open access: yesResults in Engineering
In the face of increasing global disruptions, the cybersecurity field is confronting rising threats posed by offensive groups and individual hackers. Traditional security measures often fall short in detecting and mitigating these sophisticated attacks ...
Noyan Tendikov   +6 more
doaj   +2 more sources

Advanced Techniques for Alert Management in Security Information and Event Management Systems With Ensembled Deep Learning, Hybrid Optimization, and Multi-Feature Extraction

open access: goldIEEE Open Journal of the Communications Society
The emergence of new and more sophisticated threats in cybersecurity has necessitated the improvement of security information and event management (SIEM) systems.
Mohamad Khayat   +5 more
doaj   +2 more sources

ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX

open access: diamondCyber Security dan Forensik Digital, 2019
Information security is a need to secure organizational information assets. The government as the regulator issues an Information Security Management System (ISMS) and Information Security Index (US) as a measure of information security in the agency of ...
Citra Arfanudin   +2 more
semanticscholar   +4 more sources

A Security Information and Event Management Pattern [PDF]

open access: goldProceedings of the 12th Latin-American Conference on Pattern Languages of Programs, 2019
In order to achieve a high level of cyber security awareness most mid to large sized companies use Security Information and Event Management (SIEM) embedded into a Security Operations Center.
Manfred Vielberth, G. Pernul
openalex   +2 more sources

Adaptive Monitoring of Companies' Information Security [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the algorithm of the "Event handling" subprocess was detailed. This detailing is a complex, which includes
Valerii Lakhno   +6 more
doaj   +1 more source

The factor of the risk and risk management In information security

open access: yesХабаршы. Заң сериясы, 2021
Risk is the consequence of events and dangers. To rephrase it, an event that will cause damage and deprivation and this happening can be described via the term of information. The word risk means foreseeable dangers or being under the threat of possible
A. N. Ibrahimova
doaj   +3 more sources

Attack Modelling and Security Evaluation for Security Information and Event Management

open access: goldInternational Conference on Security and Cryptography, 2012
Igor Kotenko   +2 more
openalex   +2 more sources

Analytical Visualization Techniques for Security Information and Event Management

open access: green2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, 2013
Evgenia Novikova, Igor Kotenko
openalex   +3 more sources

Relations between information science and information security culture

open access: yesJournal of Modern Science, 2023
Objectives The aim of the article is to present the relations that exist between the culture of information security and information sciences. Material and methods desk research, Literature criticism, Synthesis, Comparative analysis.
Bogusław Jagusiak, Piotr Zaskórski
doaj   +1 more source

Home - About - Disclaimer - Privacy