Results 11 to 20 of about 113,074 (208)

Australian Hard 2 (AH2) wheat class with null4A genetic basis to produce high-quality Japanese ramen noodle. [PDF]

open access: yesJ Sci Food Agric
Abstract BACKGROUND Australia exports wheat to various countries for the production of staple foods, including noodles. The Japanese market considers Australian Prime Hard (APH) wheat to be the benchmark for high‐quality ramen noodle production. We hypothesie that hard wheat with relatively low protein content and null4A gene is particularly well ...
Siah SD   +5 more
europepmc   +2 more sources

Water stress: Opportunities for supply chain research

open access: yesProduction and Operations Management, EarlyView., 2023
Abstract Driven by climate change and overuse, water stress is a worsening sustainability concern that threatens businesses and communities across the globe. Leading global organizations such as the United Nations have expressed an urgent need for sustainable water management strategies across nations and economies.
Dustin Cole   +4 more
wiley   +1 more source

МОДЕЛЬ ІДЕНТИФІКАЦІЇ КІБЕРІНЦИДЕНТІВ SIEM-СИСТЕМОЮ ДЛЯ ЗАХИСТУ ІНФОРМАЦІЙНО-КОМУНІКАЦІЙНИХ СИСТЕМ

open access: yesКібербезпека: освіта, наука, техніка, 2023
У статті представлено модель ідентифікації кіберінцидентів SIEM-системою, які відбуваються в ході функціонування інформаційно-комунікаційних систем (ІКС).
Ігор Субач   +1 more
doaj   +1 more source

Overview of Security Information and Event Management Systems [PDF]

open access: yesInformatică economică
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj   +1 more source

Study of the applicability of the hierarchy analysis method for choosing a SIEM system

open access: yesБезопасность информационных технологий, 2023
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya   +2 more
doaj   +1 more source

Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems

open access: yesFuture Internet, 2013
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko   +3 more
doaj   +1 more source

Social media and political involvement in Cambodia

open access: yesCogent Social Sciences, 2023
A total of 1,300 students in Cambodia were surveyed regarding their opinions on social media and political trust, their feelings regarding social media use, engagement on social media, and interactive relationships with social media.
Bora Ly
doaj   +1 more source

Atas do XXVIII Seminário de Investigação em Educação Matemática [PDF]

open access: yes, 2017
Em 2017, realiza-se em Viseu, pela terceira vez, o Seminário de Investigação em Educação Matemática (SIEM), dinamizado pelo Grupo de Trabalho de Investigação (GTI) da Associação de Professores de Matemática (APM).
Gomes, Helena Margarida dos Santos Vasconcelos   +5 more
core   +1 more source

Estudio de un sistema de seguridad de información y administración de eventos para base de datos SQL server. Caso de estudio: entidad pública

open access: yesRevista Odigos, 2023
La información de las organizaciones alojada en bases de datos es un activo muy Importante que debe ser resguardada de ataques cibernéticos. En la investigación se identificaron amenazas que pueden poner en peligro el motor de base de datos SQL Server ...
Franklin Edwin Vela Vela
doaj   +1 more source

Detection of Current Attacks in Active Directory Environment with Log Correlation Methods

open access: yesHavacılık ve Uzay Teknolojileri Dergisi, 2023
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj  

Home - About - Disclaimer - Privacy