Results 301 to 310 of about 977,056 (333)
Bilal AlSabbagh, Stewart Kowalski
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2024 27th International Conference on Computer and Information Technology (ICCIT)
An empirical analysis is conducted to reduce the false positive alerts in Security Information and Event Management (SIEM) systems. Through the use of recurrent Neural Networks (RNN), research aims to increase alert detection accuracy and reduce false ...
Mst. Nishita Aktar+9 more
semanticscholar +1 more source
An empirical analysis is conducted to reduce the false positive alerts in Security Information and Event Management (SIEM) systems. Through the use of recurrent Neural Networks (RNN), research aims to increase alert detection accuracy and reduce false ...
Mst. Nishita Aktar+9 more
semanticscholar +1 more source
Secur. Commun. Networks, 2016
A primary feature of cloud computing is the provision of a variety of transparent services with efficient resource utilization. However, there are concerns with cloud computing in terms of the user's data privacy and security, especially in evidence ...
M. Irfan+4 more
semanticscholar +1 more source
A primary feature of cloud computing is the provision of a variety of transparent services with efficient resource utilization. However, there are concerns with cloud computing in terms of the user's data privacy and security, especially in evidence ...
M. Irfan+4 more
semanticscholar +1 more source
Security Information and Event Management Implementation Guidance
2013This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States ...
Yushi Shen+4 more
openaire +1 more source
A Study on the Methods for Establishing Security Information & Event Management
2019There has recently been emerging a global threat caused by the attack through multi-hacking technologies against the national infrastructure, industrial control system and enterprises, what’s called cyber-hacking and cyber-attack on the cyber space like cyber war, for the sake of the nation and organization.
Jong-Bae Kim+2 more
openaire +2 more sources
Advances in Computer Science and Ubiquitous Computing, 2021
Sangwoo Kim+4 more
semanticscholar +1 more source
Sangwoo Kim+4 more
semanticscholar +1 more source
Threat classification model for security information event management focusing on model efficiency
Computers & security, 2022Jae-yeol Kim, Hyuk-Yoon Kwon
semanticscholar +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly