Results 11 to 20 of about 113,074 (208)
Australian Hard 2 (AH2) wheat class with null4A genetic basis to produce high-quality Japanese ramen noodle. [PDF]
Abstract BACKGROUND Australia exports wheat to various countries for the production of staple foods, including noodles. The Japanese market considers Australian Prime Hard (APH) wheat to be the benchmark for high‐quality ramen noodle production. We hypothesie that hard wheat with relatively low protein content and null4A gene is particularly well ...
Siah SD +5 more
europepmc +2 more sources
Water stress: Opportunities for supply chain research
Abstract Driven by climate change and overuse, water stress is a worsening sustainability concern that threatens businesses and communities across the globe. Leading global organizations such as the United Nations have expressed an urgent need for sustainable water management strategies across nations and economies.
Dustin Cole +4 more
wiley +1 more source
МОДЕЛЬ ІДЕНТИФІКАЦІЇ КІБЕРІНЦИДЕНТІВ SIEM-СИСТЕМОЮ ДЛЯ ЗАХИСТУ ІНФОРМАЦІЙНО-КОМУНІКАЦІЙНИХ СИСТЕМ
У статті представлено модель ідентифікації кіберінцидентів SIEM-системою, які відбуваються в ході функціонування інформаційно-комунікаційних систем (ІКС).
Ігор Субач +1 more
doaj +1 more source
Overview of Security Information and Event Management Systems [PDF]
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj +1 more source
Study of the applicability of the hierarchy analysis method for choosing a SIEM system
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya +2 more
doaj +1 more source
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko +3 more
doaj +1 more source
Social media and political involvement in Cambodia
A total of 1,300 students in Cambodia were surveyed regarding their opinions on social media and political trust, their feelings regarding social media use, engagement on social media, and interactive relationships with social media.
Bora Ly
doaj +1 more source
Atas do XXVIII Seminário de Investigação em Educação Matemática [PDF]
Em 2017, realiza-se em Viseu, pela terceira vez, o Seminário de Investigação em Educação Matemática (SIEM), dinamizado pelo Grupo de Trabalho de Investigação (GTI) da Associação de Professores de Matemática (APM).
Gomes, Helena Margarida dos Santos Vasconcelos +5 more
core +1 more source
La información de las organizaciones alojada en bases de datos es un activo muy Importante que debe ser resguardada de ataques cibernéticos. En la investigación se identificaron amenazas que pueden poner en peligro el motor de base de datos SQL Server ...
Franklin Edwin Vela Vela
doaj +1 more source
Detection of Current Attacks in Active Directory Environment with Log Correlation Methods
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj

