Results 31 to 40 of about 922,242 (322)

Reactive Rules for Emergency Management [PDF]

open access: yes, 2010
The goal of the following survey on Event-Condition-Action (ECA) Rules is to come to a common understanding and intuition on this topic within EMILI. Thus it does not give an academic overview on Event-Condition-Action Rules which would be valuable for ...
Brodt, Simon   +2 more
core   +1 more source

Estimating ToE Risk Level using CVSS [PDF]

open access: yes, 2009
Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, cost-benefit investments in security.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Problems of implementing SIEM systems in the practice of managing information security of economic entities

open access: yesОткрытое образование (Москва), 2020
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj   +1 more source

A scalable SIEM correlation engine and its application to the Olympic Games IT infrastructure [PDF]

open access: yes, 2013
The security event correlation scalability has become a major concern for security analysts and IT administrators when considering complex IT infrastructures that need to handle gargantuan amounts of events or wide correlation window spans.
Gulisano, Vincenzo Massimiliano   +3 more
core   +2 more sources

Using Financial Instruments to Transfer the Information Security Risks

open access: yesFuture Internet, 2016
For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event.
Pankaj Pandey, Einar Snekkenes
doaj   +1 more source

Development of technology for controlling access to digital portals and platforms based on estimates of user reaction time built into the interface

open access: yesРоссийский технологический журнал, 2020
The paper addresses the development of technology for controlling access to digital portals and platforms based on assessments of personal characteristics of user behavior built into the interface.
S. G. Magomedov   +2 more
doaj   +1 more source

Application Of Safety And Security Principles To Flood Event Management In Highly Populated Urban Areas [PDF]

open access: yes, 2005
This paper refers to non-structural actions which are to be carried out on the Arno river basin (Italy). In particular the town of Florence is considered where 56 catastrophic flood events have been recorded in the last 1000 years, the latter in 1966 ...
Calonaci, R.   +5 more
core   +1 more source

Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response

open access: yesApplied Sciences, 2023
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban   +3 more
doaj   +1 more source

Attack Classification Schema for Smart City WSNs

open access: yesSensors, 2017
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets,
Victor Garcia-Font   +2 more
doaj   +1 more source

Information Security Risk Management Model for Big Data

open access: yesAdvances in Multimedia, 2022
In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing.
Min Yang
doaj   +1 more source

Home - About - Disclaimer - Privacy