Results 171 to 180 of about 102,611 (306)
Implementing and evaluating a GDPR-compliant open-source SIEM solution
A. Vazão+3 more
semanticscholar +1 more source
ANALISIS SYN FLOOD ATTACK MENGGUNAKAN METODE NIST 800-61 REV 2 PADA SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) [PDF]
Meningkatnya ancaman siber dapat mengakibatkan kebocoran data pribadi, pencurian identitas, penyebaran virus atau malware, hingga serangan siber yang dapat merusak sistem dan infrastruktur yang krusial bagi organisasi.
Nurhadi, Acmad+1 more
core +1 more source
Using the SIEM Software vulnerability detection model proposed
In-seok Jeon+3 more
openalex +2 more sources
The review of SIEM in the Russian Market
Lev Levin, V. A. Trushin, Kirill Donskoy
openaire +2 more sources
Tourism workers' resilience in Siem Reap during COVID-19
Michele Ford, Soksamphoas Im
semanticscholar +1 more source
Behavioral Dynamics of Smart Home Adoption: A PLS-SEM Study in Emerging Markets
This study investigates the adoption of smart home technologies (SHTs) in Cambodia by integrating the unified theory of acceptance and use of technology (UTAUT) and diffusion of innovation (DOI) theories, a novel approach in an emerging market context ...
Bora Ly, Romny Ly, Sokhom Ma
doaj +1 more source
The Correct Kriging Variance Estimated by Bootstrapping [PDF]
The classic Kriging variance formula is widely used in geostatistics and in the design and analysis of computer experiments.This paper proves that this formula is wrong.Furthermore, it shows that the formula underestimates the Kriging variance in ...
Hertog, D. den+2 more
core +1 more source
Stochastic forecasting of variable small data as a basis for analyzing an early stage of a cyber epidemic. [PDF]
Kovtun V+4 more
europepmc +1 more source
Discrete Least-norm Approximation by Nonnegative (Trigonomtric) Polynomials and Rational Functions [PDF]
Polynomials, trigonometric polynomials, and rational functions are widely used for the discrete approximation of functions or simulation models.Often, it is known beforehand, that the underlying unknown function has certain properties, e.g.
Hertog, D. den+2 more
core +1 more source