Results 241 to 250 of about 110,735 (289)
Some of the next articles are maybe not open access.
Global Communications Conference, 2023
The Software-Defined Networking (SDN) paradigm has introduced heightened flexibility and scalability to network infrastructure management. However, the centralized control plane inherent in SDN architectures is susceptible to an array of security ...
Anass Sebbar+3 more
semanticscholar +1 more source
The Software-Defined Networking (SDN) paradigm has introduced heightened flexibility and scalability to network infrastructure management. However, the centralized control plane inherent in SDN architectures is susceptible to an array of security ...
Anass Sebbar+3 more
semanticscholar +1 more source
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
USENIX Security Symposium, 2023Cyberattacks have grown into a major risk for organizations, with common consequences being data theft, sabotage, and extortion. Since preventive measures do not suffice to repel attacks, timely detection of successful intruders is crucial to stop them ...
Rafael Uetz+4 more
semanticscholar +1 more source
International Conference on Recent Advances and Innovations in Engineering, 2023
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata+4 more
semanticscholar +1 more source
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata+4 more
semanticscholar +1 more source
Light SIEM for semiconductor industry [PDF]
Information security is the foundation of enterprise information framework, and a strong enterprise information framework benefits business growth. Information security management system combined with business data can provide more effective service for enterprise.
Xuan Zhu Sherry Zhu+3 more
openaire +1 more source
Shielding Web Application against Cyber-Attacks using SIEM
Automation, Control, and Information Technology, 2023This paper considers SIEM technology as one of the mechanisms for protecting web applications from cyberattacks. The most common vulnerabilities and attack surfaces on web applications are analyzed and a list of security events that SIEM can handle is ...
Andriy Yushko+5 more
semanticscholar +1 more source
Socio-Technical SIEM (ST-SIEM)
International Journal of Systems and Society, 2017This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response practice—the lack of sufficient context in actionable security information disseminated to constituent organizations ...
Stewart Kowalski, Bilal AlSabbagh
openaire +2 more sources
International Conference Computing Engineering and Design, 2023
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu+3 more
semanticscholar +1 more source
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu+3 more
semanticscholar +1 more source
Intelligent-based SIEM security email alert
International Conference on Information and Communicatiaon Technology, 2023SIEM, or Security Information and Event Management, can be considered the latest cybersecurity technology in the security strategy that was taken and utilized mostly by professional cybersecurity teams.
Chyun Horng Chi+5 more
semanticscholar +1 more source
The Applicability of a SIEM Solution: Requirements and Evaluation
2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2019The need for SIEM systems increased in the last few years, especially as cyber-attacks are evolving and targeting enterprises, which may cause discontinuity of their services, leakage of their data, and affect their reputation. Cybersecurity breaches can range from no or limited impact to stealing or manipulation of data, or even taking control of ...
Mokalled H+5 more
openaire +3 more sources
A viable SIEM approach for Android
2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015Mobile devices such as smartphones and tablet PCs are increasingly used for business purposes. However, the trustworthiness of operating systems and apps is controversial. They can constitute a threat to corporate networks and infrastructures, if they are not audited or monitored.
Schölzel, Markus+2 more
openaire +2 more sources