Results 121 to 130 of about 102,611 (306)
Resilient event collection in SIEM systems [PDF]
Tese de mestrado em Segurança Informática, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2013A importância da Segurança da Informação tem crescido rapidamente nos últimos anos, com uma maior consciencialização da sociedade civil
Rodrigues, Pedro da Silva Dias
core
Adabi Raihan Muhammad+2 more
semanticscholar +1 more source
Regime‐Switching Density Forecasts Using Economists' Scenarios
ABSTRACT We propose an approach for generating macroeconomic density forecasts that incorporate information on multiple scenarios defined by experts. We adopt a regime‐switching framework in which sets of scenarios (“views”) are used as Bayesian priors on economic regimes. Predictive densities coming from different views are then combined by optimizing
Graziano Moramarco
wiley +1 more source
Gestión automatizada e integrada de controles de seguridad informática
En el presente trabajo se propone un modelo para la gestión automatizada e integrada de controles de seguridad informática, basado en sistemas de gestión de información y eventos de seguridad (SIEM), que posibilita aumentar la efectividad de los ...
Raydel Montesino Perurena+2 more
doaj +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni+2 more
wiley +1 more source
Radiative strength function in 96Mo reanalyzed [PDF]
The radiative strength functions of 96Mo have been reanalyzed. The enhanced gamma strength for E_gamma < 3 - 4 MeV is confirmed.
arxiv
Profile for Aquatic Resources Management: Tboung Kla, Koh Chruem and Ou Chralang villages, Ou Mreah commune, Siem Bouk district, Stung Treng province, Cambodia [PDF]
This publication is part of a collection of three profiles covering nine aquatic resources-dependent villages in the provinces of Stung Treng, Takeo and Siem Reap.
Ahmed, M.+5 more
core
Tjan Tjoe Siem: Javaansche kaartspelen. Bijdrage tot de beschrijving van land en volk [PDF]
Ε. M. Uhlenbeck
openalex +1 more source
Creating a SIEM with the Elastic Stack or with OpenSearch
Nowadays every organization is exposed to the intrinsic risks associated to the use of Information Technology. Cyber threats are more powerful and dangerous all the time. Data breaches cost organizations millions of euros every year. Therefore, they must prepare and protect infrastructures for such attacks even anticipating them if possible.
openaire +1 more source
Optimizing SIEM Throughput on the Cloud Using Parallelization
تشكل معالجة كميات كبيرة من البيانات في الوقت الفعلي لتحديد المشكلات الأمنية العديد من تحديات الأداء، خاصة عندما تكون البنية التحتية للأجهزة محدودة. يتلقى مقدمو خدمات الأمن المدارة (MSSP)، ومعظمهم يستضيفون تطبيقاتهم على السحابة، أحداثًا بمعدل مرتفع جدًا يتراوح من بضع مئات إلى بضعة آلاف حدث في الثانية (EPS).
Masoom Alam+8 more
openaire +5 more sources