Results 1 to 10 of about 109,912 (250)

Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs. [PDF]

open access: yesPLoS ONE
The proliferation of cyber threats necessitates robust security measures to safeguard critical assets and data in today's evolving digital landscape.
Jawad Manzoor   +3 more
doaj   +2 more sources

Use of the International Classification of Diseases to Perinatal Mortality (ICD-PM) with verbal autopsy to determine the causes of stillbirths and neonatal deaths in rural Cambodia: a population-based, prospective, cohort studyResearch in context [PDF]

open access: yesThe Lancet Regional Health. Western Pacific
Summary: Background: Perinatal mortality remains a significant global health challenge, particularly in low- and middle-income countries (LMICs). Accurate cause-of-death data are essential to inform effective interventions but are often scarce.
Kaajal Patel   +9 more
doaj   +2 more sources

Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]

open access: yesSensors
Advances in connectivity, communication, computation, and algorithms are driving a revolution that will bring economic and social benefits through smart technologies of the Industry 4.0 era.
Muhammad Sheeraz   +5 more
doaj   +2 more sources

Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology.
Valerii Lakhno   +5 more
doaj   +1 more source

A SIEM Architecture for Advanced Anomaly Detection [PDF]

open access: yesOpen Journal of Big Data, 2022
Dramatic increases in the number of cyber security attacks and breaches toward businesses and organizations have been experienced in recent years. The negative impacts of these breaches not only cause the stealing and compromising of sensitive information, malfunctioning of network devices, disruption of everyday operations, financial damage to the ...
Laue, Tim   +3 more
openaire   +2 more sources

Problems of implementing SIEM systems in the practice of managing information security of economic entities

open access: yesОткрытое образование (Москва), 2020
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj   +1 more source

Salmonella Typhi and Paratyphi A infections in Cambodian children, 2012–2016

open access: yesInternational Journal of Infectious Diseases, 2020
Objectives: Enteric fever remains an important diagnostic and treatment challenge in febrile children living in the tropics. In the context of a national Salmonella enterica serovar Paratyphi A outbreak, the objective of this retrospective study was to ...
Chheng Kheng   +4 more
doaj   +1 more source

Healthcare workers’ perceptions of an organizational quality assurance program implemented in a resource-limited setting: a qualitative study [PDF]

open access: yesHealth Promotion Perspectives, 2018
Background:There is increasing awareness of the need to implement quality assurance programs in developing countries. Healthcare staff are the primary drivers of improving the quality of care,but little is known about how they perceive quality assurance ...
Hiroko Henker   +5 more
doaj   +1 more source

Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures

open access: yesSensors, 2021
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo   +2 more
doaj   +1 more source

ПОТЕНЦІЙНІ ВІДВОЛІКАЮЧІ АТАКИ НА ОПЕРАЦІЙНІ ЦЕНТРИ БЕЗПЕКИ ТА SIEM СИСТЕМИ

open access: yesКібербезпека: освіта, наука, техніка, 2021
В даній статі розглянуто деякі потенційні вектори атак, що можуть бути здійснені на  системи моніторингу операційних центрів безпеки (SOC), зокрема системи SIEM.
Roman Drahuntsov, Dmytro Rabchun
doaj   +1 more source

Home - About - Disclaimer - Privacy