Providing SIEM systems with self-adaptation [PDF]
Security information and event management (SIEM) is considered to be a promising paradigm to reconcile traditional intrusion detection processes along with most recent advances on artificial intelligence techniques in providing automatic and self-adaptive systems. However, classic management-related flaws still persist, e.g. the fusion of large amounts
Suarez-Tangil, Guillermo+3 more
openaire +6 more sources
Study of the applicability of the hierarchy analysis method for choosing a SIEM system
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya+2 more
doaj +3 more sources
Simple, Fast, and Accurate Cybercrime Detection on E-Government with Elastic Stack SIEM
Increased public activity in cyberspace (Internet) during the Covid-19 pandemic has also increased cybercrime cases with various attack targets, including E-Government services. Cybercrime is hidden and occurs unnoticed in E-Government, so handling it is
Ichsan Yudhianto
semanticscholar +3 more sources
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response [PDF]
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban+3 more
doaj +2 more sources
An Assessment Platform of Cybersecurity Attacks against the MQTT Protocol using SIEM
The industry of shared self-driving is increasingly interested in the Message Queuing Telemetry Transport (MQTT) solution to develop and evaluate their autonomous and shared mobility services.
Mohamed Hadded+4 more
semanticscholar +3 more sources
: It is estimated that the number of devices and sensors connected to the Internet of Things (Internet of Things) will grow to around 125 billion by the end of this decade, compared to 21 billion this year.
Marwan Alaa Hussein, E. Hamza
semanticscholar +2 more sources
Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Alessia Garofalo+4 more
openalex +4 more sources
From Detection to Prediction: AI-powered SIEM for Proactive Threat Hunting and Risk Mitigation
The evolution of cybersecurity has witnessed a transformative shift from reactive defense measures to proactive threat-hunting and risk-mitigation strategies.
Srinivas Reddy Pulyala
semanticscholar +3 more sources
DETEKSI MENGGUNAKAN PCR (POLYMERASE CHAIN REACTION) CANDIDATUS LIBERIBACTER ASIATICUS, PENYEBAB HUANGLONGBING PADA JERUK SIEM DENGAN BEBERAPA TIPE GEJALA PADA DAUN [PDF]
Detection using PCR (Polymerase Chain Reaction) Candidatus Liberibacter asiaticus, Huanglongbing causal Organism on Siem Mandarin with different types of symptoms.
Achmad Himawan, Yohanes Berchmans umardiyono, Susamto Somowiyarjo, Yohanes Andi Trisyono & Andrew Beattie.
doaj +3 more sources
Peningkatan Mutu Buah Jeruk Siem Berdasarkan Masa Panen Basis Kalender dan Karakteristik Fisik dan Sensorisnya [PDF]
Harvesting the siem orange from its plants usually is not uniform. Citrus farmers sell their crops based on the request of the middlemen regardless of the age of harvest.
N. Handayani+2 more
semanticscholar +3 more sources