Results 171 to 180 of about 102,611 (306)

Implementing and evaluating a GDPR-compliant open-source SIEM solution

open access: yesJournal of Information Security and Applications, 2023
A. Vazão   +3 more
semanticscholar   +1 more source

ANALISIS SYN FLOOD ATTACK MENGGUNAKAN METODE NIST 800-61 REV 2 PADA SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) [PDF]

open access: yes
Meningkatnya ancaman siber dapat mengakibatkan kebocoran data pribadi, pencurian identitas, penyebaran virus atau malware, hingga serangan siber yang dapat merusak sistem dan infrastruktur yang krusial bagi organisasi.
Nurhadi, Acmad   +1 more
core   +1 more source

Using the SIEM Software vulnerability detection model proposed

open access: bronze, 2015
In-seok Jeon   +3 more
openalex   +2 more sources

The review of SIEM in the Russian Market

open access: yesTransaction of Scientific Papers of the Novosibirsk State Technical University, 2017
Lev Levin, V. A. Trushin, Kirill Donskoy
openaire   +2 more sources

Tourism workers' resilience in Siem Reap during COVID-19

open access: yesAnnals of Tourism Research Empirical Insights, 2023
Michele Ford, Soksamphoas Im
semanticscholar   +1 more source

Behavioral Dynamics of Smart Home Adoption: A PLS-SEM Study in Emerging Markets

open access: yesHuman Behavior and Emerging Technologies
This study investigates the adoption of smart home technologies (SHTs) in Cambodia by integrating the unified theory of acceptance and use of technology (UTAUT) and diffusion of innovation (DOI) theories, a novel approach in an emerging market context ...
Bora Ly, Romny Ly, Sokhom Ma
doaj   +1 more source

The Correct Kriging Variance Estimated by Bootstrapping [PDF]

open access: yes
The classic Kriging variance formula is widely used in geostatistics and in the design and analysis of computer experiments.This paper proves that this formula is wrong.Furthermore, it shows that the formula underestimates the Kriging variance in ...
Hertog, D. den   +2 more
core   +1 more source

Discrete Least-norm Approximation by Nonnegative (Trigonomtric) Polynomials and Rational Functions [PDF]

open access: yes
Polynomials, trigonometric polynomials, and rational functions are widely used for the discrete approximation of functions or simulation models.Often, it is known beforehand, that the underlying unknown function has certain properties, e.g.
Hertog, D. den   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy