A high performance hybrid LSTM CNN secure architecture for IoT environments using deep learning. [PDF]
Sinha P+5 more
europepmc +1 more source
Case report: Severe asthma exacerbation with steroid-induced anaphylaxis in a 30-year-old female. [PDF]
Alkhan F+4 more
europepmc +1 more source
Securing the Future of Railway Systems: A Comprehensive Cybersecurity Strategy for Critical On-Board and Track-Side Infrastructure. [PDF]
Ibadah N, Benavente-Peces C, Pahl MO.
europepmc +1 more source
A dynamic decision-making approach for cabin unlawful interference emergency disposal using dynamic Bayesian network. [PDF]
Wu Y, He S, Shi J.
europepmc +1 more source
A Variant of the Analytical Specification of Security Information and Event Management Systems
The object of the study in the chapter is a variant of the analytical specification of the state change dynamics characterizing the quality indicators of the process fulfilled by a security information and event management (SIEM) system. A generalized model of such a system based on the state and observation equations taking into account advanced ...
Igor Kotenko, Igor Parashchuk
openaire +3 more sources
SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management
Within today’s organizations, a Security Information and Event Management (SIEM) system is the centralized repository expected to aggregate all security-relevant data. While the primary purpose of SIEM solutions has been regulatory compliance, more and more organizations recognize the value of these systems for threat detection due to their holistic ...
Christoph Meinel+2 more
openaire +3 more sources
Related searches:
An Analysis of Information Security Event Managers
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), 2016The most effective security starts with real time visibility into all activity on all systems, networks, database and applications. In this paper the focus in on structured data however, some semi-structured and unstructured data is also explored. Whether the source is from network traffic, user activity, or the application user, any variation from ...
Meikang Qiu+4 more
openaire +2 more sources
Analytical Visualization Techniques for Security Information and Event Management
2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, 2013The paper proposes the architecture of the visualization component for the Security Information and Event Management (SIEM) system. The SIEM systems help to comprehend large amounts of the security data. Visualization is the essential part of the SIEM systems.
Novikova E., Kotenko I.
openaire +2 more sources
CONSTRUCTION OF MEMBERSHIP FUNCTIONS IN FUZZY SECURITY INFORMATION AND EVENT MANAGEMENT TASKS
I.V. Kotenko, I.B. Parashchuk
openaire +2 more sources