Results 291 to 300 of about 977,056 (333)
A Variant of the Analytical Specification of Security Information and Event Management Systems
The object of the study in the chapter is a variant of the analytical specification of the state change dynamics characterizing the quality indicators of the process fulfilled by a security information and event management (SIEM) system. A generalized model of such a system based on the state and observation equations taking into account advanced ...
Igor Kotenko, Igor Parashchuk
openalex +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
International Conference on Internet of Things and Intelligence System, 2023
Web applications face increasing security threats, with a 210% rise in attacks in 2022 compared to 2020, including 172 daily attacks per website and 2,306 weekly bot accesses.
Tia Rahmawati+5 more
semanticscholar +1 more source
Web applications face increasing security threats, with a 210% rise in attacks in 2022 compared to 2020, including 172 daily attacks per website and 2,306 weekly bot accesses.
Tia Rahmawati+5 more
semanticscholar +1 more source
International Conference on Recent Advances and Innovations in Engineering, 2023
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata+4 more
semanticscholar +1 more source
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata+4 more
semanticscholar +1 more source
International Conference Computing Engineering and Design, 2023
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu+3 more
semanticscholar +1 more source
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu+3 more
semanticscholar +1 more source
Study of challenges faced by Enterprises using Security Information and Event Management (SIEM)
Journal of University of Shanghai for Science and Technology, 2021The field of information security plays an important role in education, IT, health domain, etc. Much research has been carried out in order to secure data in hardware, on the cloud, and during transmission over the network. A secure data transmission and
M. Yadav, Dhirendra S. Mishra
semanticscholar +1 more source
An Analysis of Information Security Event Managers
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), 2016The most effective security starts with real time visibility into all activity on all systems, networks, database and applications. In this paper the focus in on structured data however, some semi-structured and unstructured data is also explored. Whether the source is from network traffic, user activity, or the application user, any variation from ...
Meikang Qiu+4 more
openaire +2 more sources
Analytical Visualization Techniques for Security Information and Event Management
2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, 2013The paper proposes the architecture of the visualization component for the Security Information and Event Management (SIEM) system. The SIEM systems help to comprehend large amounts of the security data. Visualization is the essential part of the SIEM systems.
Novikova E., Kotenko I.
openaire +2 more sources
CONSTRUCTION OF MEMBERSHIP FUNCTIONS IN FUZZY SECURITY INFORMATION AND EVENT MANAGEMENT TASKS
Igor Kotenko, Igor Parashchuk
openalex +2 more sources
Dynamical Attack Simulation for Security Information and Event Management [PDF]
The chapter considers a simulation-based approach to analysis of network resilience to botnet attacks in security information and event management (SIEM) systems, which can be applied to distributed geographic information systems (GISs). On the other hand, SIEM systems can use GIS technology for network awareness, taking into account the geographical ...
Andrey Shorov+3 more
openaire +1 more source
2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS)
Security Information and Event Management (SIEM) systems have become essential assets in the realm of cybersecurity. They fulfill a central role in the prevention, detection, and response to cyber threats.
Sashwin K+4 more
semanticscholar +1 more source
Security Information and Event Management (SIEM) systems have become essential assets in the realm of cybersecurity. They fulfill a central role in the prevention, detection, and response to cyber threats.
Sashwin K+4 more
semanticscholar +1 more source