Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs. [PDF]
The proliferation of cyber threats necessitates robust security measures to safeguard critical assets and data in today's evolving digital landscape.
Jawad Manzoor+3 more
doaj +3 more sources
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo+2 more
doaj +2 more sources
Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime+4 more
doaj +2 more sources
Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj +2 more sources
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]
Advances in connectivity, communication, computation, and algorithms are driving a revolution that will bring economic and social benefits through smart technologies of the Industry 4.0 era.
Muhammad Sheeraz+5 more
doaj +2 more sources
A Building Extraction Method for High-Resolution Remote Sensing Images with Multiple Attentions and Parallel Encoders Combining Enhanced Spectral Information [PDF]
Accurately extracting pixel-level buildings from high-resolution remote sensing images is significant for various geographical information applications. Influenced by different natural, cultural, and social development levels, buildings may vary in shape
Zhaojun Pang+5 more
doaj +2 more sources
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object [PDF]
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology.
Valerii Lakhno+5 more
doaj +1 more source
A SIEM Architecture for Advanced Anomaly Detection [PDF]
Dramatic increases in the number of cyber security attacks and breaches toward businesses and organizations have been experienced in recent years. The negative impacts of these breaches not only cause the stealing and compromising of sensitive information, malfunctioning of network devices, disruption of everyday operations, financial damage to the ...
Laue, Tim+3 more
openaire +2 more sources
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj +1 more source
Healthcare workers’ perceptions of an organizational quality assurance program implemented in a resource-limited setting: a qualitative study [PDF]
Background:There is increasing awareness of the need to implement quality assurance programs in developing countries. Healthcare staff are the primary drivers of improving the quality of care,but little is known about how they perceive quality assurance ...
Hiroko Henker+5 more
doaj +1 more source