Results 1 to 10 of about 114,400 (283)

Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs. [PDF]

open access: yesPLoS ONE
The proliferation of cyber threats necessitates robust security measures to safeguard critical assets and data in today's evolving digital landscape.
Jawad Manzoor   +3 more
doaj   +3 more sources

Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]

open access: yesSensors
Advances in connectivity, communication, computation, and algorithms are driving a revolution that will bring economic and social benefits through smart technologies of the Industry 4.0 era.
Muhammad Sheeraz   +5 more
doaj   +3 more sources

Providing SIEM systems with self-adaptation [PDF]

open access: greenInformation Fusion, 2015
Security information and event management (SIEM) is considered to be a promising paradigm to reconcile traditional intrusion detection processes along with most recent advances on artificial intelligence techniques in providing automatic and self-adaptive systems. However, classic management-related flaws still persist, e.g. the fusion of large amounts
Suarez-Tangil, Guillermo   +3 more
openaire   +6 more sources

Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response [PDF]

open access: goldApplied Sciences, 2023
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban   +3 more
doaj   +2 more sources

Study of the applicability of the hierarchy analysis method for choosing a SIEM system

open access: diamondБезопасность информационных технологий, 2023
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya   +2 more
doaj   +3 more sources

DETEKSI MENGGUNAKAN PCR (POLYMERASE CHAIN REACTION) CANDIDATUS LIBERIBACTER ASIATICUS, PENYEBAB HUANGLONGBING PADA JERUK SIEM DENGAN BEBERAPA TIPE GEJALA PADA DAUN [PDF]

open access: yesJurnal Hama dan Penyakit Tumbuhan Tropika, 2011
Detection using PCR (Polymerase Chain Reaction) Candidatus Liberibacter asiaticus, Huanglongbing causal Organism on Siem Mandarin with different types of symptoms.
Achmad Himawan, Yohanes Berchmans umardiyono, Susamto Somowiyarjo, Yohanes Andi Trisyono & Andrew Beattie.
doaj   +3 more sources

Use of the International Classification of Diseases to Perinatal Mortality (ICD-PM) with verbal autopsy to determine the causes of stillbirths and neonatal deaths in rural Cambodia: a population-based, prospective, cohort studyResearch in context [PDF]

open access: yesThe Lancet Regional Health. Western Pacific
Summary: Background: Perinatal mortality remains a significant global health challenge, particularly in low- and middle-income countries (LMICs). Accurate cause-of-death data are essential to inform effective interventions but are often scarce.
Kaajal Patel   +9 more
doaj   +2 more sources

Principles of data collection for building a secure enterprise infrastructure based on SIEM systems

open access: diamondВестник Дагестанского государственного технического университета: Технические науки
Objective. The purpose of the article is to present the main capabilities and advantages of implementing and using SIEM systems.Method. System analysis method was used.Result.
A. D. Popov, A. N. Nikitenko
doaj   +3 more sources

Analysis of docker container Implementation in SIEM infrastructure

open access: goldJournal of Applied Informatics and Computing
It is known that configuring system information and event management (SIEM) infrastructure using conventional virtualization still provides essential functions.
Noper Ardi   +2 more
doaj   +2 more sources

Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology.
Valerii Lakhno   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy