Results 281 to 290 of about 2,702,156 (313)
Some of the next articles are maybe not open access.

Security Information and Event Management Implementation Guidance

2013
This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States ...
Yushi Shen   +4 more
openaire   +1 more source

A Study on the Methods for Establishing Security Information & Event Management

2019
There has recently been emerging a global threat caused by the attack through multi-hacking technologies against the national infrastructure, industrial control system and enterprises, what’s called cyber-hacking and cyber-attack on the cyber space like cyber war, for the sake of the nation and organization.
Jong-Bae Kim   +2 more
openaire   +2 more sources

Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018
Security Information and Event Management Systems (SIEM) are generally very complex systems encapsulating a large number of functions with different behaviors. Visualization is a common way of data presentation in these systems along with other data presentation ways such as reporting, alerting, text messaging.
Banu Gunel, Ferda Özdemir Sönmez
openaire   +2 more sources

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly  

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

IEEE Communications Surveys and Tutorials, 2022
Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly  

Security framework using traffic analysis and security information and event management

WIT Transactions on Information and Communication Technologies, 2015
N. J. Kim, Hye Jin Pyo, E. I. Choi
openaire   +2 more sources

Machine Learning in IoT Security: Current Solutions and Future Challenges

IEEE Communications Surveys and Tutorials, 2020
Ekram Hossain   +2 more
exaly  

A Survey on Metaverse: Fundamentals, Security, and Privacy

IEEE Communications Surveys and Tutorials, 2023
Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly  

Home - About - Disclaimer - Privacy