Results 61 to 70 of about 53,613 (192)

Threat Hunting the Shadows: Detecting Adversary Lateral Movement With Elasticsearch

open access: yesIEEE Access
This research investigates the elusive tactic of lateral movement employed by adversaries within a compromised network. The focus is on identifying the mechanisms and techniques used for lateral movement, with a particular emphasis on credential access ...
Naif Alsharabi   +5 more
doaj   +1 more source

Data Mining Approach in Security Information and Event Management [PDF]

open access: yesInternational Journal of Future Computer and Communication, 2013
Anita Rajendra Zope   +2 more
openaire   +1 more source

Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics

open access: yesEgyptian Informatics Journal
The concept of the Internet of Things (IoT) threat surface refers to the overall susceptibility of smart devices to potential security risks. This vulnerability includes the combined impact of security weaknesses, gaps in protective measures, and ...
Akashdeep Bhardwaj   +5 more
doaj   +1 more source

Efficient and Standardized Alarm Rationalization for Cybersecurity Monitoring

open access: yesIEEE Access
Threat monitoring in cybersecurity systems is often jeopardized by alarm flooding, which frequently occurs in Security Information and Event Management (SIEM) solutions due to the unnecessary annunciation of numerous logs and event data from a variety of
Sarah Alabdulhadi, Ali Al-Matouq
doaj   +1 more source

SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEMS

open access: yes, 2013
The fast development of computer technology and electronic networks has contributed to the introduction of information systems to different economic activities. This has significantly increased the exposure to security threats and potential intrusions into such systems.
openaire   +1 more source

Wazuh SIEM for Cyber Security and Threat Mitigation in Apparel Industries

open access: yesInternational Journal of Engineering Materials and Manufacture
Security of IT infrastructure is critical in the modern digital environment, particularly for industries that manufacture clothing. The application of the Wazuh Security Information and Event Management (SIEM) system to improve security monitoring and ...
Md Rafiqul Islam, Raisa Rafique
doaj   +1 more source

Sicurezza Territoriale e gestione delle emergenze: soluzioni ed architetture per sistemi collaborativi

open access: yesGEOmedia, 2010
Intergraph's solutions for Public Safety & Security, Critical Infrastructures Protection and Emergency Operation Centers Intergraph provides the world’s leading public safety dispatch system, which is accessed by more than half a billion people ...
Andrea Fiduccia
doaj   +2 more sources

Home - About - Disclaimer - Privacy