Results 251 to 260 of about 110,735 (289)
Some of the next articles are maybe not open access.
Проблемы внедрения SIEM-систем
ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ, 2023Данная статья рассматривает проблему экспертозависимости при эксплуатации SIEMсистем. Актуальность темы обусловлена увеличением значимости роли систем класса SIEM в условиях значительного роста числа компьютерных атак на ИТ-системы.
Д.А. Казьмин
semanticscholar +1 more source
2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS)
Security Information and Event Management (SIEM) systems have become essential assets in the realm of cybersecurity. They fulfill a central role in the prevention, detection, and response to cyber threats.
Sashwin K+4 more
semanticscholar +1 more source
Security Information and Event Management (SIEM) systems have become essential assets in the realm of cybersecurity. They fulfill a central role in the prevention, detection, and response to cyber threats.
Sashwin K+4 more
semanticscholar +1 more source
Management and Monitoring Security Events in a Business Organization - SIEM system
International Convention on Information and Communication Technology, Electronics and Microelectronics, 2022Business organizations are increasingly facing advanced threats, which have been particularly affected by new circumstances such as remote work. In such circumstances, members of IT security need to have appropriate systems that are ready to respond to ...
A. Skendzic+2 more
semanticscholar +1 more source
Integrating Next-Generation SIEM with Data Lakes and AI: Advancing Threat Detection and Response
Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023The article focuses on how Next-Gen SIEM can be extended with Data Lakes and AI to improve threat detection and response in current threat landscapes.
Rahul Marri+2 more
semanticscholar +1 more source
Developing SIEM and Log Management for Automotive Network in a Simulated Environment
Symposium on Intelligent Systems and InformaticsModern vehicles' increasing connectivity and complexity have made them susceptible to various cyber threats. To address this, Security Information and Event Management systems (SIEM), commonly used in IT environments, are being adapted for the automotive
M. Saulaiman+8 more
semanticscholar +1 more source
$$\mathcal {B}$$SIEM-IoT: A Blockchain-Based and Distributed SIEM for the Internet of Things
2019The paper at hand proposes \(\mathcal {B}\)SIEM-IoT, a Security Information and Event Management solution (SIEM) for the Internet of Things (IoT) relying on blockchain to store and access security events. The security events included in the blockchain are contributed by a number of IoT sentinels in charge of protecting a group of IoT devices.
Andrés Pardo Mesa+3 more
openaire +2 more sources
2024 5th International Conference on Communications, Information, Electronic and Energy Systems (CIEES)
SQL injection attacks pose a significant threat to web applications and database systems. This study evaluates the effectiveness of integrating Security Information and Event Management (SIEM) with multi-Wazuh agents and diverse Web Application Firewalls
Mustaghfir Naufal Zaidan+2 more
semanticscholar +1 more source
SQL injection attacks pose a significant threat to web applications and database systems. This study evaluates the effectiveness of integrating Security Information and Event Management (SIEM) with multi-Wazuh agents and diverse Web Application Firewalls
Mustaghfir Naufal Zaidan+2 more
semanticscholar +1 more source
The Analysis of Attacks Against Port 80 Webserver with SIEM Wazuh Using Detection and OSCAR Methods
2022 5th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), 2022The existence of the internet in the company leads data and information exchange activities easier. The ease to obtain company data and information which is not accompanied by information security awareness results in the emergence of data leaks and ...
Tri Suryantoro+2 more
semanticscholar +1 more source
Open source SIEM solutions for an enterprise
Information and Computer Security, 2022Purpose The security of applications, systems and networks has always been the source of great concern for both enterprises and common users. Different security tools like intrusion detection system/intrusion prevention system and firewalls are ...
Aamna Tariq+4 more
semanticscholar +1 more source
Network Security, 2011
In the 1964 motion picture, Dr Strangelove or: How I Learned to Stop Worrying and Love the Bomb, a paranoid general played by Sterling Hayden is able to hack into a system and initiate a nuclear attack on the Soviet Union without the knowledge of his superiors.
openaire +2 more sources
In the 1964 motion picture, Dr Strangelove or: How I Learned to Stop Worrying and Love the Bomb, a paranoid general played by Sterling Hayden is able to hack into a system and initiate a nuclear attack on the Soviet Union without the knowledge of his superiors.
openaire +2 more sources