Results 41 to 50 of about 922,242 (322)

A Study on Capabilities and functionalities of Security Information and Event Management systems(SIEM) [PDF]

open access: yes, 2015
Security Management is the important issue in the IT Industry. IT industries is in need of a tool which can help in managing the information and events and increase the grade of security.
, Dhawal S. Shah
core   +2 more sources

V-SOC4AS: A Vehicle-SOC for Improving Automotive Security

open access: yesAlgorithms, 2023
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using
Vita Santa Barletta   +5 more
doaj   +1 more source

Attack and defence methods in cyber‐physical power system

open access: yesIET Energy Systems Integration, 2022
With the development of digitalisation and intelligence, the power system has been upgraded from the traditional single energy transmission and conversion system to a complex cyber‐physical power system (CPPS) with tightly coupled energy and information ...
Ting Yang, Yuzhe Liu, Wei Li
doaj   +1 more source

Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces

open access: yesApplied Sciences, 2023
The rapid expansion of digital twin technology has revolutionized management and testing across various sectors, particularly in safeguarding critical infrastructure like smart grids.
Luigi Coppolino   +3 more
doaj   +1 more source

New Perspectives on the Use of Satellite Information in Contemporary Armed Conflicts and Crisis Management

open access: yesPolish Political Science Yearbook, 2023
Among current global threats, the risk of developing an emergency requires a comprehensive approach from all entities involved in crisis management. Despite the advanced technologies available to predict each threat, taking appropriate countermeasures is
Krzysztof Goniewicz
doaj   +1 more source

Privacy and Security Management in Intelligent Transportation System

open access: yesIEEE Access, 2020
Metropolitan transportation is a dynamic and non-linear complex system. In such a system, there are possibilities of altering, monitoring, forging, and accessing private, public, and resource information of depot staff and communicating agents by ...
Suresh Chavhan   +5 more
doaj   +1 more source

occumb: An R package for site occupancy modeling of eDNA metabarcoding data

open access: yesPopulation Ecology, EarlyView.
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley   +1 more source

Security Information and Event Management -järjestelmät [PDF]

open access: yes, 2015
Opinnäytetyö tehtiin Itä-Suomen yliopistolle, jolla on tarve keskitettyyn lokienhallintaan ja tietoturvan monitorointiin. Työn päätavoitteena on toimia apuvälineenä Security Information and Event Management -järjestelmiin perehtymiseen. Tästä aiheesta on
Ryynänen, Perttu, Tuupanen, Markus
core  

Detection of Current Attacks in Active Directory Environment with Log Correlation Methods

open access: yesHavacılık ve Uzay Teknolojileri Dergisi, 2023
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj  

A novel security information and event management system for enhancing cyber security in a hydroelectric dam

open access: yesInternational Journal of Critical Infrastructure Protection, 2016
Security information and event management (SIEM) systems are increasingly used to cope with the security challenges involved in critical infrastructure protection. However, these systems have several limitations. This paper describes an enhanced security information and event management system that (i) resolves conflicts between security policies; (ii)
Di Sarno C   +3 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy