Results 11 to 20 of about 110,052 (200)

Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]

open access: green, 2019
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari   +17 more
core   +10 more sources

Study of the applicability of the hierarchy analysis method for choosing a SIEM system

open access: diamondБезопасность информационных технологий, 2023
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities.
Natalia G. Miloslavskaya   +2 more
doaj   +3 more sources

Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]

open access: green, 2014
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Di Sarno, Cesario   +4 more
core   +3 more sources

Principles of data collection for building a secure enterprise infrastructure based on SIEM systems

open access: diamondВестник Дагестанского государственного технического университета: Технические науки
Objective. The purpose of the article is to present the main capabilities and advantages of implementing and using SIEM systems.Method. System analysis method was used.Result.
A. D. Popov, A. N. Nikitenko
doaj   +3 more sources

Water stress: Opportunities for supply chain research

open access: yesProduction and Operations Management, EarlyView., 2023
Abstract Driven by climate change and overuse, water stress is a worsening sustainability concern that threatens businesses and communities across the globe. Leading global organizations such as the United Nations have expressed an urgent need for sustainable water management strategies across nations and economies.
Dustin Cole   +4 more
wiley   +1 more source

Mechanisms That Prevent Vascular Leakage During Leukocyte Extravasation. [PDF]

open access: yesActa Physiol (Oxf)
ABSTRACT Background Inflammation is the response of the immune system against harmful stimuli in tissues. Leukocyte extravasation or TransEndothelial Migration (TEM) is a crucial step during inflammation, in which leukocytes migrate over the endothelial barrier toward the damaged tissue.
de Haan SJ, van Buul JD.
europepmc   +2 more sources

Barriers and facilitators to neonatal health and care-seeking behaviours in rural Cambodia: a qualitative study

open access: yesBMJ Open, 2020
Objectives Neonatal mortality remains persistently high in low-income and middle-income countries. In Cambodia, there is a paucity of data on the perception of neonatal health and care-seeking behaviours at the community level.
Manila Prak   +6 more
doaj   +1 more source

Overview of Security Information and Event Management Systems [PDF]

open access: yesInformatică economică
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj   +1 more source

Social media and political involvement in Cambodia

open access: yesCogent Social Sciences, 2023
A total of 1,300 students in Cambodia were surveyed regarding their opinions on social media and political trust, their feelings regarding social media use, engagement on social media, and interactive relationships with social media.
Bora Ly
doaj   +1 more source

Home - About - Disclaimer - Privacy