Results 241 to 250 of about 110,735 (289)
Some of the next articles are maybe not open access.

Real-Time Anomaly Detection in SDN Architecture Using Integrated SIEM and Machine Learning for Enhancing Network Security

Global Communications Conference, 2023
The Software-Defined Networking (SDN) paradigm has introduced heightened flexibility and scalability to network infrastructure management. However, the centralized control plane inherent in SDN architectures is susceptible to an array of security ...
Anass Sebbar   +3 more
semanticscholar   +1 more source

You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks

USENIX Security Symposium, 2023
Cyberattacks have grown into a major risk for organizations, with common consequences being data theft, sabotage, and extortion. Since preventive measures do not suffice to repel attacks, timely detection of successful intruders is crucial to stop them ...
Rafael Uetz   +4 more
semanticscholar   +1 more source

A Log Aggregation Design Criteria for Robust SIEM (Security Information and Event Management) in Enhancing Threat Detection

International Conference on Recent Advances and Innovations in Engineering, 2023
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata   +4 more
semanticscholar   +1 more source

Light SIEM for semiconductor industry [PDF]

open access: possible2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2017
Information security is the foundation of enterprise information framework, and a strong enterprise information framework benefits business growth. Information security management system combined with business data can provide more effective service for enterprise.
Xuan Zhu Sherry Zhu   +3 more
openaire   +1 more source

Shielding Web Application against Cyber-Attacks using SIEM

Automation, Control, and Information Technology, 2023
This paper considers SIEM technology as one of the mechanisms for protecting web applications from cyberattacks. The most common vulnerabilities and attack surfaces on web applications are analyzed and a list of security events that SIEM can handle is ...
Andriy Yushko   +5 more
semanticscholar   +1 more source

Socio-Technical SIEM (ST-SIEM)

International Journal of Systems and Society, 2017
This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response practice—the lack of sufficient context in actionable security information disseminated to constituent organizations ...
Stewart Kowalski, Bilal AlSabbagh
openaire   +2 more sources

Enhancing Security Information and Event Management (SIEM) by Incorporating Machine Learning for Cyber Attack Detection

International Conference Computing Engineering and Design, 2023
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu   +3 more
semanticscholar   +1 more source

Intelligent-based SIEM security email alert

International Conference on Information and Communicatiaon Technology, 2023
SIEM, or Security Information and Event Management, can be considered the latest cybersecurity technology in the security strategy that was taken and utilized mostly by professional cybersecurity teams.
Chyun Horng Chi   +5 more
semanticscholar   +1 more source

The Applicability of a SIEM Solution: Requirements and Evaluation

2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2019
The need for SIEM systems increased in the last few years, especially as cyber-attacks are evolving and targeting enterprises, which may cause discontinuity of their services, leakage of their data, and affect their reputation. Cybersecurity breaches can range from no or limited impact to stealing or manipulation of data, or even taking control of ...
Mokalled H   +5 more
openaire   +3 more sources

A viable SIEM approach for Android

2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015
Mobile devices such as smartphones and tablet PCs are increasingly used for business purposes. However, the trustworthiness of operating systems and apps is controversial. They can constitute a threat to corporate networks and infrastructures, if they are not audited or monitored.
Schölzel, Markus   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy