Results 271 to 280 of about 2,702,156 (313)
Some of the next articles are maybe not open access.

Challenges and Directions in Security Information and Event Management (SIEM)

2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2018
Security Information and Event Management (SIEM) is the state-of-the-practice in handling heterogeneous data sources for security analysis. This paper presents challenges and directions in SIEM in the context of a real-life mission critical system by a top leading company in the Air Traffic Control domain.
Cinque, Marcello   +2 more
openaire   +4 more sources

The Operational Role of Security Information and Event Management Systems

IEEE Security & Privacy, 2014
An integral part of an enterprise computer security incident response team (CSIRT), the security operations center (SOC) is a centralized unit tasked with real-time monitoring and identification of security incidents. Security information and event management (SIEM) systems are an important tool used in SOCs; they collect security events from many ...
Sandeep N. Bhatt   +2 more
openaire   +2 more sources

A Security Information and Event Management Pattern

2018
In order to achieve a high level of cyber security awareness most mid to large sized companies use Security Information and Event Management (SIEM) embedded into a Security Operations Center. These systems enable the centralized collection and analysis of security relevant information generated by a variety of different systems, to detect advanced ...
Vielberth, Manfred, Pernul, Günther
openaire   +2 more sources

Security information and event management in the cloud computing infrastructure

2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI), 2014
Security of information systems is a current topic. In the case of cloud environment it is even a critical factor. In large environments like the cloud computing systems, it can be difficult to maintain a comprehensive view of the safety of the individual elements.
Ales Komarek   +2 more
openaire   +2 more sources

Dynamical Attack Simulation for Security Information and Event Management [PDF]

open access: possible, 2013
The chapter considers a simulation-based approach to analysis of network resilience to botnet attacks in security information and event management (SIEM) systems, which can be applied to distributed geographic information systems (GISs). On the other hand, SIEM systems can use GIS technology for network awareness, taking into account the geographical ...
Andrey Shorov   +3 more
openaire   +1 more source

The deployment of Security Information and Event Management in cloud infrastructure

2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 2015
This article deals with the problematics of data safety and security in cloud environment while using Security Information and Event Management (SIEM). This article introduces and critically assesses the basic principles of SIEM in data infrastructure, its deployments in specific cloud environment, and technical requirements for SIEM solution ...
Sona Neradova   +4 more
openaire   +2 more sources

Implementing Dockerized Elastic Stack for Security Information and Event Management

2020 - 5th International Conference on Information Technology (InCIT), 2020
In security information and event management (SIEM), real-time monitoring together with analysis of log data for correlation of events can provide anomaly detection and notification. A centralized log system with big-data databases is required for SIEM in order to store and manage the log data.
Ferdy Mulyadi   +3 more
openaire   +2 more sources

A Trusted Information Agent for Security Information and Event Management

open access: closed, 2012
This paper addresses security information management in untrusted environments. A security information and event management system collects and examines security related events and provides a unifying view of the monitored system's security status. The sensors, which provide the event data, are typically placed in a non-protected environment at the ...
Luigi Coppolino   +3 more
openaire   +2 more sources

New Types of Alert Correlation for Security Information and Event Management Systems

2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2016
Current Security Information and Event Management systems (SIEMs) constitute the central platform of modern security operations centers. They gather events from multiple sensors (intrusion detection systems, anti-virus, firewalls, etc.), correlate these events, and deliver synthetic views of the alerts for threat handling and security reporting ...
Gonzalez Granadillo, Gustavo Daniel   +2 more
openaire   +3 more sources

Towards visual analytics tasks for the security information and event management

2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS), 2017
Visual analytics is an actively developing multidisciplinary research area which can be successfully used in the field of information security management. The visual analytics techniques are used to monitor information security level of the information system and form situation awareness of the security officer.
Andrey Shorov   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy