Study of the applicability of the hierarchy analysis method for choosing a SIEM system
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya +2 more
doaj +3 more sources
Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs. [PDF]
The proliferation of cyber threats necessitates robust security measures to safeguard critical assets and data in today's evolving digital landscape.
Jawad Manzoor +3 more
doaj +2 more sources
Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection [PDF]
Advances in connectivity, communication, computation, and algorithms are driving a revolution that will bring economic and social benefits through smart technologies of the Industry 4.0 era.
Muhammad Sheeraz +5 more
doaj +2 more sources
Use of the International Classification of Diseases to Perinatal Mortality (ICD-PM) with verbal autopsy to determine the causes of stillbirths and neonatal deaths in rural Cambodia: a population-based, prospective, cohort studyResearch in context [PDF]
Summary: Background: Perinatal mortality remains a significant global health challenge, particularly in low- and middle-income countries (LMICs). Accurate cause-of-death data are essential to inform effective interventions but are often scarce.
Kaajal Patel +9 more
doaj +2 more sources
Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach [PDF]
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime +4 more
doaj +2 more sources
ZenGuard a machine learning based zero trust framework for context aware threat mitigation using SIEM SOAR and UEBA. [PDF]
Hassan A +4 more
europepmc +3 more sources
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object [PDF]
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology.
Valerii Lakhno +5 more
doaj +1 more source
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj +1 more source
Salmonella Typhi and Paratyphi A infections in Cambodian children, 2012–2016
Objectives: Enteric fever remains an important diagnostic and treatment challenge in febrile children living in the tropics. In the context of a national Salmonella enterica serovar Paratyphi A outbreak, the objective of this retrospective study was to ...
Chheng Kheng +4 more
doaj +1 more source
Healthcare workers’ perceptions of an organizational quality assurance program implemented in a resource-limited setting: a qualitative study [PDF]
Background:There is increasing awareness of the need to implement quality assurance programs in developing countries. Healthcare staff are the primary drivers of improving the quality of care,but little is known about how they perceive quality assurance ...
Hiroko Henker +5 more
doaj +1 more source

