Results 121 to 130 of about 102,611 (306)

Resilient event collection in SIEM systems [PDF]

open access: yes, 2013
Tese de mestrado em Segurança Informática, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2013A importância da Segurança da Informação tem crescido rapidamente nos últimos anos, com uma maior consciencialização da sociedade civil
Rodrigues, Pedro da Silva Dias
core  

Integrated Security Information and Event Management (SIEM) with Intrusion Detection System (IDS) for Live Analysis based on Machine Learning

open access: yesIEEE International Symposium on Multimedia, 2023
Adabi Raihan Muhammad   +2 more
semanticscholar   +1 more source

Regime‐Switching Density Forecasts Using Economists' Scenarios

open access: yesJournal of Forecasting, Volume 44, Issue 2, Page 833-845, March 2025.
ABSTRACT We propose an approach for generating macroeconomic density forecasts that incorporate information on multiple scenarios defined by experts. We adopt a regime‐switching framework in which sets of scenarios (“views”) are used as Bayesian priors on economic regimes. Predictive densities coming from different views are then combined by optimizing
Graziano Moramarco
wiley   +1 more source

Gestión automatizada e integrada de controles de seguridad informática

open access: yesRevista Ingeniería Electrónica, Automática y Comunicaciones, 2013
En el presente trabajo se propone un modelo para la gestión automatizada e integrada de controles de seguridad informática, basado en sistemas de gestión de información y eventos de seguridad (SIEM), que posibilita aumentar la efectividad de los ...
Raydel Montesino Perurena   +2 more
doaj   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Radiative strength function in 96Mo reanalyzed [PDF]

open access: yesarXiv, 2008
The radiative strength functions of 96Mo have been reanalyzed. The enhanced gamma strength for E_gamma < 3 - 4 MeV is confirmed.
arxiv  

Profile for Aquatic Resources Management: Tboung Kla, Koh Chruem and Ou Chralang villages, Ou Mreah commune, Siem Bouk district, Stung Treng province, Cambodia [PDF]

open access: yes
This publication is part of a collection of three profiles covering nine aquatic resources-dependent villages in the provinces of Stung Treng, Takeo and Siem Reap.
Ahmed, M.   +5 more
core  

Creating a SIEM with the Elastic Stack or with OpenSearch

open access: yes, 2021
Nowadays every organization is exposed to the intrinsic risks associated to the use of Information Technology. Cyber threats are more powerful and dangerous all the time. Data breaches cost organizations millions of euros every year. Therefore, they must prepare and protect infrastructures for such attacks even anticipating them if possible.
openaire   +1 more source

Optimizing SIEM Throughput on the Cloud Using Parallelization

open access: yesPLOS ONE, 2016
تشكل معالجة كميات كبيرة من البيانات في الوقت الفعلي لتحديد المشكلات الأمنية العديد من تحديات الأداء، خاصة عندما تكون البنية التحتية للأجهزة محدودة. يتلقى مقدمو خدمات الأمن المدارة (MSSP)، ومعظمهم يستضيفون تطبيقاتهم على السحابة، أحداثًا بمعدل مرتفع جدًا يتراوح من بضع مئات إلى بضعة آلاف حدث في الثانية (EPS).
Masoom Alam   +8 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy