Results 231 to 240 of about 114,400 (283)
Some of the next articles are maybe not open access.
Systematic review of SIEM technology: SIEM-SC birth
International Journal of Information Security, 2023Juan Miguel López Velásquez+3 more
openaire +2 more sources
IJRDO-journal of computer science engineering, 2023
Incorporating NER in SIEM systems introduces a revolutionary approach to interacting with the data to security analysts. Security data, prearranged for using natural language to query, improves the systems' usability and accelerates decision-making and ...
Sukender Reddy Mallreddy, Yeshwanth Vasa
semanticscholar +1 more source
Incorporating NER in SIEM systems introduces a revolutionary approach to interacting with the data to security analysts. Security data, prearranged for using natural language to query, improves the systems' usability and accelerates decision-making and ...
Sukender Reddy Mallreddy, Yeshwanth Vasa
semanticscholar +1 more source
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
USENIX Security Symposium, 2023Cyberattacks have grown into a major risk for organizations, with common consequences being data theft, sabotage, and extortion. Since preventive measures do not suffice to repel attacks, timely detection of successful intruders is crucial to stop them ...
Rafael Uetz+4 more
semanticscholar +1 more source
Integrating OT data in SIEM platforms: an Energy Utility Perspective
2023 International Conference on Electrical, Communication and Computer Engineering (ICECCE), 2023One of the main current challenges for Security Information and Event Management (SIEM) platforms is to integrate data generated by Industrial Control Systems (ICS).
Alessandro Armellin+5 more
semanticscholar +1 more source
International Conference on Recent Advances and Innovations in Engineering, 2023
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata+4 more
semanticscholar +1 more source
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata+4 more
semanticscholar +1 more source
Socio-Technical SIEM (ST-SIEM)
International Journal of Systems and Society, 2017This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response practice—the lack of sufficient context in actionable security information disseminated to constituent organizations ...
Stewart Kowalski, Bilal AlSabbagh
openaire +2 more sources
Global Communications Conference, 2023
The Software-Defined Networking (SDN) paradigm has introduced heightened flexibility and scalability to network infrastructure management. However, the centralized control plane inherent in SDN architectures is susceptible to an array of security ...
Anass Sebbar+3 more
semanticscholar +1 more source
The Software-Defined Networking (SDN) paradigm has introduced heightened flexibility and scalability to network infrastructure management. However, the centralized control plane inherent in SDN architectures is susceptible to an array of security ...
Anass Sebbar+3 more
semanticscholar +1 more source
Light SIEM for semiconductor industry [PDF]
Information security is the foundation of enterprise information framework, and a strong enterprise information framework benefits business growth. Information security management system combined with business data can provide more effective service for enterprise.
Xuan Zhu Sherry Zhu+3 more
openaire +1 more source
International Conference on Internet of Things and Intelligence System, 2023
Web applications face increasing security threats, with a 210% rise in attacks in 2022 compared to 2020, including 172 daily attacks per website and 2,306 weekly bot accesses.
Tia Rahmawati+5 more
semanticscholar +1 more source
Web applications face increasing security threats, with a 210% rise in attacks in 2022 compared to 2020, including 172 daily attacks per website and 2,306 weekly bot accesses.
Tia Rahmawati+5 more
semanticscholar +1 more source
Shielding Web Application against Cyber-Attacks using SIEM
Automation, Control, and Information Technology, 2023This paper considers SIEM technology as one of the mechanisms for protecting web applications from cyberattacks. The most common vulnerabilities and attack surfaces on web applications are analyzed and a list of security events that SIEM can handle is ...
Andriy Yushko+5 more
semanticscholar +1 more source