Results 41 to 50 of about 1,030,469 (325)
Information Security Risk Management Model for Big Data
In the current society of rapid expansion of information, big data have achieved vigorous development in all walks of life, considerably promoting data transmission and information sharing.
Min Yang
doaj +1 more source
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban +3 more
doaj +1 more source
A Formal Framework for Concrete Reputation Systems [PDF]
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core +2 more sources
Web Service Trust: Towards A Dynamic Assessment Framework [PDF]
Trust in software services is a key prerequisite for the success and wide adoption of services-oriented computing (SOC) in an open Internet world. However, trust is poorly assessed by existing methods and technologies, especially in dynamically composed ...
LoPresti, S., Spanoudakis, G.
core +1 more source
V-SOC4AS: A Vehicle-SOC for Improving Automotive Security
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using
Vita Santa Barletta +5 more
doaj +1 more source
Security Information and Event Management -järjestelmät [PDF]
Opinnäytetyö tehtiin Itä-Suomen yliopistolle, jolla on tarve keskitettyyn lokienhallintaan ja tietoturvan monitorointiin. Työn päätavoitteena on toimia apuvälineenä Security Information and Event Management -järjestelmiin perehtymiseen. Tästä aiheesta on
Ryynänen, Perttu, Tuupanen, Markus
core
Security risk assessment and protection in the chemical and process industry [PDF]
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute +19 more
core +1 more source
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Di Sarno, Cesario +4 more
core +1 more source
ABSTRACT Background In Ewing sarcoma (EwS), metastases, including those to bone marrow (BM), are the main factors influencing prognosis. Although reverse transcription polymerase chain reaction (RT‐PCR) offers greater sensitivity, the current EWING protocol defines BM metastases solely using light microscopic detection.
Thanh Pham +13 more
wiley +1 more source

