Results 261 to 270 of about 110,735 (289)
Some of the next articles are maybe not open access.
2022 15th International Conference on Information Security and Cryptography (ISCTURKEY), 2022
Cyber criminals can use many different methods to completely lose their traces after their actions or to complicate the work of forensic experts. Detection of such suspected anti-forensic activities can guide the detection of cyber crimes that have been ...
Mustafa Çağrı Fanuscu+2 more
semanticscholar +1 more source
Cyber criminals can use many different methods to completely lose their traces after their actions or to complicate the work of forensic experts. Detection of such suspected anti-forensic activities can guide the detection of cyber crimes that have been ...
Mustafa Çağrı Fanuscu+2 more
semanticscholar +1 more source
SIEM with LSA technique for Threat identification
2013 19th IEEE International Conference on Networks (ICON), 2013Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with ...
Pavarit Dairinram+2 more
openaire +2 more sources
An Ontology-Based Model for SIEM Environments [PDF]
The management of security events, from the analysis of attacks and risk to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, network and system devices are designed to be heterogeneous, with different characteristics and functionalities that increase the difficulty of ...
Nabil Hachem+3 more
openaire +1 more source
The evolution and application of SIEM systems
Network Security, 2014Anyone in a data-driven job like security, fraud, business intelligence, performance monitoring or any other data-dependant field will have heard about the latest phenomenon of ‘big data’. This exciting technological breakthrough promises to make business more efficient, identify anything that might harm it well ahead of time, and predict the future ...
openaire +2 more sources
Enhancing SIEM Technology to Protect Critical Infrastructures
2013Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory Control And Data Acquisition (SCADA) systems are increasing and becoming more sophisticated. Typically, SCADA has been designed without having security in mind, which is indeed approached by reusing solutions to protect solely Information Technology (IT) based ...
COPPOLINO, Luigi+3 more
openaire +3 more sources
New SIEM System for the Internet of Things
2019Based on the available standards, the generalized architecture and the reference model of the IoT as a security object to be protected are presented. On the IoT layers, different security controls collecting data for further detection of security-related events are located.
Alexander Tolstoy, Natalia Miloslavskaya
openaire +2 more sources
Why SIEM is Irreplaceable in a Secure IT Environment?
2019 Open Conference of Electrical, Electronic and Information Sciences (eStream), 2019The aim of the publication is to brief on the importance of a SIEM (Security Information and Event Management) solution. Its benefits but also taking time to reflect on this system drawbacks. All of which is intended for those who are looking into cybersecurity solution that will learn from entire IT infrastructure and be able to identify anomalies ...
Oskars Podzins, Andrejs Romanovs
openaire +2 more sources
Segmentation of vegetation scenes: the SIEMS method
SPIE Proceedings, 2012This paper presents an unsupervised segmentation method dedicated to vegetation scenes with decametric or metric spatial resolutions. The proposed algorithm, named SIEMS, is based on the iterative use of the Expectation–Maximization algorithm and offers a good trade-off between oversegmentation and undersegmentation.
openaire +2 more sources
Low-Cost Serverless SIEM in the Cloud
2019 38th Symposium on Reliable Distributed Systems (SRDS), 2019Security systems such as the Security Information and Event Management (SIEMs) have been used to monitor logs and correlate data to quickly detect and respond to incidents. Despite their advantages, SIEMs are expensive to deploy and maintain, requiring extra budget and specialized staff.
Iberia Medeiros+2 more
openaire +2 more sources
Jurnal Ilmu Komputer dan Teknologi Informasi
This research develops an anomaly detection application for the internet network of the Disaster Recovery Center (DRC) building at the Training Agency of the Indonesian Prosecutor's Office (Badan Diklat Kejaksaan RI), implemented with Security ...
Issenoro+4 more
semanticscholar +1 more source
This research develops an anomaly detection application for the internet network of the Disaster Recovery Center (DRC) building at the Training Agency of the Indonesian Prosecutor's Office (Badan Diklat Kejaksaan RI), implemented with Security ...
Issenoro+4 more
semanticscholar +1 more source