Results 31 to 40 of about 1,030,766 (332)
Assessment of crisis readiness to move a patient from the airport with suspected Ebola [PDF]
The aim of this article is to verify the readiness of patient transport from the airport with symptoms for Ebola disease by the rescue services of the Integrated Rescue System of the Czech Republic.
Blahová, Marta, Hromada, Martin
core +1 more source
Information Security Risk Management Model for Big Data
In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing.
Min Yang
doaj +1 more source
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban +3 more
doaj +1 more source
Dynamic deployment of context-aware access control policies for constrained security devices [PDF]
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic +4 more
core +1 more source
V-SOC4AS: A Vehicle-SOC for Improving Automotive Security
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using
Vita Santa Barletta +5 more
doaj +1 more source
A Formal Framework for Concrete Reputation Systems [PDF]
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core +2 more sources
Comparative Analysis of IBM Qradar and Wazuh for Security Information and Event Management [PDF]
The idea for this paper was to compare two leading SIEM tools - the commercial IBM QRadar SIEM versus Wazuh, an open-source security solution. The topic was chosen to see whether these two tools can satisfy the security requirements in a typical IT infrastructure.
Dario Suskalo +3 more
openaire +1 more source
In the face of increasing global disruptions, the cybersecurity field is confronting rising threats posed by offensive groups and individual hackers. Traditional security measures often fall short in detecting and mitigating these sophisticated attacks ...
Noyan Tendikov +6 more
doaj +1 more source
Security Information and Event Management -järjestelmät [PDF]
Opinnäytetyö tehtiin Itä-Suomen yliopistolle, jolla on tarve keskitettyyn lokienhallintaan ja tietoturvan monitorointiin. Työn päätavoitteena on toimia apuvälineenä Security Information and Event Management -järjestelmiin perehtymiseen. Tästä aiheesta on
Ryynänen, Perttu, Tuupanen, Markus
core
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source

