Results 1 to 10 of about 110,588 (201)

Study of the applicability of the hierarchy analysis method for choosing a SIEM system

open access: diamondБезопасность информационных технологий, 2023
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya   +2 more
doaj   +3 more sources

Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs. [PDF]

open access: yesPLoS ONE
The proliferation of cyber threats necessitates robust security measures to safeguard critical assets and data in today's evolving digital landscape.
Jawad Manzoor   +3 more
doaj   +2 more sources

Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]

open access: yesSensors
Advances in connectivity, communication, computation, and algorithms are driving a revolution that will bring economic and social benefits through smart technologies of the Industry 4.0 era.
Muhammad Sheeraz   +5 more
doaj   +2 more sources

Use of the International Classification of Diseases to Perinatal Mortality (ICD-PM) with verbal autopsy to determine the causes of stillbirths and neonatal deaths in rural Cambodia: a population-based, prospective, cohort studyResearch in context [PDF]

open access: yesThe Lancet Regional Health. Western Pacific
Summary: Background: Perinatal mortality remains a significant global health challenge, particularly in low- and middle-income countries (LMICs). Accurate cause-of-death data are essential to inform effective interventions but are often scarce.
Kaajal Patel   +9 more
doaj   +2 more sources

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach [PDF]

open access: goldApplied Sciences, 2023
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime   +4 more
doaj   +2 more sources

Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology.
Valerii Lakhno   +5 more
doaj   +1 more source

Problems of implementing SIEM systems in the practice of managing information security of economic entities

open access: yesОткрытое образование (Москва), 2020
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj   +1 more source

Salmonella Typhi and Paratyphi A infections in Cambodian children, 2012–2016

open access: yesInternational Journal of Infectious Diseases, 2020
Objectives: Enteric fever remains an important diagnostic and treatment challenge in febrile children living in the tropics. In the context of a national Salmonella enterica serovar Paratyphi A outbreak, the objective of this retrospective study was to ...
Chheng Kheng   +4 more
doaj   +1 more source

Healthcare workers’ perceptions of an organizational quality assurance program implemented in a resource-limited setting: a qualitative study [PDF]

open access: yesHealth Promotion Perspectives, 2018
Background:There is increasing awareness of the need to implement quality assurance programs in developing countries. Healthcare staff are the primary drivers of improving the quality of care,but little is known about how they perceive quality assurance ...
Hiroko Henker   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy