Results 301 to 310 of about 977,056 (333)

A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM)

open access: closedEuropean Intelligence and Security Informatics Conference, 2016
Bilal AlSabbagh, Stewart Kowalski
openalex   +2 more sources

Enhancing False Positive Alert Detection in Security Information and Event Management System Using Recurrent Neural Network

2024 27th International Conference on Computer and Information Technology (ICCIT)
An empirical analysis is conducted to reduce the false positive alerts in Security Information and Event Management (SIEM) systems. Through the use of recurrent Neural Networks (RNN), research aims to increase alert detection accuracy and reduce false ...
Mst. Nishita Aktar   +9 more
semanticscholar   +1 more source

A framework for cloud forensics evidence collection and analysis using security information and event management

Secur. Commun. Networks, 2016
A primary feature of cloud computing is the provision of a variety of transparent services with efficient resource utilization. However, there are concerns with cloud computing in terms of the user's data privacy and security, especially in evidence ...
M. Irfan   +4 more
semanticscholar   +1 more source

Security Information and Event Management Implementation Guidance

2013
This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States ...
Yushi Shen   +4 more
openaire   +1 more source

A Study on the Methods for Establishing Security Information & Event Management

2019
There has recently been emerging a global threat caused by the attack through multi-hacking technologies against the national infrastructure, industrial control system and enterprises, what’s called cyber-hacking and cyber-attack on the cyber space like cyber war, for the sake of the nation and organization.
Jong-Bae Kim   +2 more
openaire   +2 more sources

Security Information and Event Management Model Based on Defense-in-Depth Strategy for Vital Digital Assets in Nuclear Facilities

Advances in Computer Science and Ubiquitous Computing, 2021
Sangwoo Kim   +4 more
semanticscholar   +1 more source

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly  

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

IEEE Communications Surveys and Tutorials, 2022
Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly  

Home - About - Disclaimer - Privacy