Results 31 to 40 of about 53,613 (192)
Attack Classification Schema for Smart City WSNs
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets,
Victor Garcia-Font +2 more
doaj +1 more source
Information Security Risk Management Model for Big Data
In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing.
Min Yang
doaj +1 more source
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban +3 more
doaj +1 more source
Possibilistic Information Flow Control for Workflow Management Systems [PDF]
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Thomas Bauereiss, Dieter Hutter
doaj +1 more source
V-SOC4AS: A Vehicle-SOC for Improving Automotive Security
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using
Vita Santa Barletta +5 more
doaj +1 more source
A Component-Based Approach for Securing Indoor Home Care Applications
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly ...
Aitor Agirre +3 more
doaj +1 more source
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces
The rapid expansion of digital twin technology has revolutionized management and testing across various sectors, particularly in safeguarding critical infrastructure like smart grids.
Luigi Coppolino +3 more
doaj +1 more source
Security information and event management (SIEM) systems are increasingly used to cope with the security challenges involved in critical infrastructure protection. However, these systems have several limitations. This paper describes an enhanced security information and event management system that (i) resolves conflicts between security policies; (ii)
Di Sarno C +3 more
openaire +5 more sources
The Cyber Security Incident Response Team executes its critical duties in the Centralized Security Operation Centers. Its primary target is to protect organizational resources from all types of Advanced Persistent Threats (APTs) and attacks while making ...
Gauhar Ali +2 more
doaj +1 more source
Detection of Current Attacks in Active Directory Environment with Log Correlation Methods
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj

