Results 11 to 20 of about 114,400 (283)
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.
Gustavo González-Granadillo+2 more
doaj +2 more sources
Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime+4 more
doaj +2 more sources
Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj +2 more sources
Simple, Fast, and Accurate Cybercrime Detection on E-Government with Elastic Stack SIEM
Increased public activity in cyberspace (Internet) during the Covid-19 pandemic has also increased cybercrime cases with various attack targets, including E-Government services. Cybercrime is hidden and occurs unnoticed in E-Government, so handling it is
Ichsan Yudhianto
openalex +3 more sources
An Assessment Platform of Cybersecurity Attacks against the MQTT Protocol using SIEM
The industry of shared self-driving is increasingly interested in the Message Queuing Telemetry Transport (MQTT) solution to develop and evaluate their autonomous and shared mobility services.
Mohamed Hadded+4 more
openalex +3 more sources
: It is estimated that the number of devices and sensors connected to the Internet of Things (Internet of Things) will grow to around 125 billion by the end of this decade, compared to 21 billion this year.
Alaa Marwan, Ekhlas Kadhum Hamza
openalex +2 more sources
From Detection to Prediction: AI-powered SIEM for Proactive Threat Hunting and Risk Mitigation
The evolution of cybersecurity has witnessed a transformative shift from reactive defense measures to proactive threat-hunting and risk-mitigation strategies.
Srinivas Reddy Pulyala
openalex +3 more sources
The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into ...
V. A. Sizov, A. D. Kirov
doaj +1 more source
A SIEM Architecture for Advanced Anomaly Detection [PDF]
Dramatic increases in the number of cyber security attacks and breaches toward businesses and organizations have been experienced in recent years. The negative impacts of these breaches not only cause the stealing and compromising of sensitive information, malfunctioning of network devices, disruption of everyday operations, financial damage to the ...
Laue, Tim+3 more
openaire +2 more sources
Salmonella Typhi and Paratyphi A infections in Cambodian children, 2012–2016
Objectives: Enteric fever remains an important diagnostic and treatment challenge in febrile children living in the tropics. In the context of a national Salmonella enterica serovar Paratyphi A outbreak, the objective of this retrospective study was to ...
Chheng Kheng+4 more
doaj +1 more source