Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari +17 more
core +11 more sources
Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Di Sarno, Cesario +4 more
core +3 more sources
Study of the applicability of the hierarchy analysis method for choosing a SIEM system
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya +2 more
doaj +3 more sources
Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs. [PDF]
The proliferation of cyber threats necessitates robust security measures to safeguard critical assets and data in today's evolving digital landscape.
Jawad Manzoor +3 more
doaj +2 more sources
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]
Advances in connectivity, communication, computation, and algorithms are driving a revolution that will bring economic and social benefits through smart technologies of the Industry 4.0 era.
Muhammad Sheeraz +5 more
doaj +2 more sources
Use of the International Classification of Diseases to Perinatal Mortality (ICD-PM) with verbal autopsy to determine the causes of stillbirths and neonatal deaths in rural Cambodia: a population-based, prospective, cohort studyResearch in context [PDF]
Summary: Background: Perinatal mortality remains a significant global health challenge, particularly in low- and middle-income countries (LMICs). Accurate cause-of-death data are essential to inform effective interventions but are often scarce.
Kaajal Patel +9 more
doaj +2 more sources
ZenGuard a machine learning based zero trust framework for context aware threat mitigation using SIEM SOAR and UEBA. [PDF]
Hassan A +4 more
europepmc +3 more sources
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object [PDF]
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology.
Valerii Lakhno +5 more
doaj +1 more source
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj +1 more source
Salmonella Typhi and Paratyphi A infections in Cambodian children, 2012–2016
Objectives: Enteric fever remains an important diagnostic and treatment challenge in febrile children living in the tropics. In the context of a national Salmonella enterica serovar Paratyphi A outbreak, the objective of this retrospective study was to ...
Chheng Kheng +4 more
doaj +1 more source

