Results 21 to 30 of about 1,030,766 (332)
Estimating ToE Risk Level using CVSS [PDF]
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal +1 more
core +3 more sources
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj +1 more source
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning
The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security.
Muhammad Arsalan Paracha +4 more
doaj +1 more source
A scalable SIEM correlation engine and its application to the Olympic Games IT infrastructure [PDF]
The security event correlation scalability has become a major concern for security analysts and IT administrators when considering complex IT infrastructures that need to handle gargantuan amounts of events or wide correlation window spans.
Gulisano, Vincenzo Massimiliano +3 more
core +2 more sources
Using Financial Instruments to Transfer the Information Security Risks
For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event.
Pankaj Pandey, Einar Snekkenes
doaj +1 more source
Analytical Visualization Techniques for Security Information and Event Management
The paper proposes the architecture of the visualization component for the Security Information and Event Management (SIEM) system. The SIEM systems help to comprehend large amounts of the security data. Visualization is the essential part of the SIEM systems.
Evgenia Novikova, Igor Kotenko
openalex +3 more sources
The paper addresses the development of technology for controlling access to digital portals and platforms based on assessments of personal characteristics of user behavior built into the interface.
S. G. Magomedov +2 more
doaj +1 more source
Application Of Safety And Security Principles To Flood Event Management In Highly Populated Urban Areas [PDF]
This paper refers to non-structural actions which are to be carried out on the Arno river basin (Italy). In particular the town of Florence is considered where 56 catastrophic flood events have been recorded in the last 1000 years, the latter in 1966 ...
Calonaci, R. +5 more
core +1 more source
Use of Imaging Spectrometer Data and Multispectral Imagery for Improved Earthquake Response [PDF]
Imaging and Applied Optics Technical Digest, 2012Multispectral imagery and imaging spectrometer data are used to develop prototype map products for improved earthquake response.
Carlisle, Sarah C. +3 more
core +1 more source
Attack Classification Schema for Smart City WSNs
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets,
Victor Garcia-Font +2 more
doaj +1 more source

