Results 261 to 270 of about 114,400 (283)
Some of the next articles are maybe not open access.

Why SIEM is Irreplaceable in a Secure IT Environment?

2019 Open Conference of Electrical, Electronic and Information Sciences (eStream), 2019
The aim of the publication is to brief on the importance of a SIEM (Security Information and Event Management) solution. Its benefits but also taking time to reflect on this system drawbacks. All of which is intended for those who are looking into cybersecurity solution that will learn from entire IT infrastructure and be able to identify anomalies ...
Oskars Podzins, Andrejs Romanovs
openaire   +2 more sources

New SIEM System for the Internet of Things

2019
Based on the available standards, the generalized architecture and the reference model of the IoT as a security object to be protected are presented. On the IoT layers, different security controls collecting data for further detection of security-related events are located.
Alexander Tolstoy, Natalia Miloslavskaya
openaire   +2 more sources

Segmentation of vegetation scenes: the SIEMS method

SPIE Proceedings, 2012
This paper presents an unsupervised segmentation method dedicated to vegetation scenes with decametric or metric spatial resolutions. The proposed algorithm, named SIEMS, is based on the iterative use of the Expectation–Maximization algorithm and offers a good trade-off between oversegmentation and undersegmentation.
openaire   +2 more sources

Perancangan dan Pengembangan Aplikasi Deteksi Anomali pada Jaringan Internet Gedung Disaster Recovery Center Badan Diklat Kejaksaan RI dengan Implementasi Sistem Manajemen Informasi dan Keamanan (SIEM) Berbasis Web

Jurnal Ilmu Komputer dan Teknologi Informasi
This research develops an anomaly detection application for the internet network of the Disaster Recovery Center (DRC) building at the Training Agency of the Indonesian Prosecutor's Office (Badan Diklat Kejaksaan RI), implemented with Security ...
Issenoro   +4 more
semanticscholar   +1 more source

Low-Cost Serverless SIEM in the Cloud

2019 38th Symposium on Reliable Distributed Systems (SRDS), 2019
Security systems such as the Security Information and Event Management (SIEMs) have been used to monitor logs and correlate data to quickly detect and respond to incidents. Despite their advantages, SIEMs are expensive to deploy and maintain, requiring extra budget and specialized staff.
Iberia Medeiros   +2 more
openaire   +2 more sources

Building better data protection with SIEM

Computer Fraud & Security, 2015
In today's data-rich enterprises, information is currency. This makes the requirement to protect it against external security threats more acute than ever. Already, the exponential increase in sophisticated data breaches seen in recent years has prompted IT and security administrators to move from simply being aware of the most up-to-date security ...
openaire   +2 more sources

SIEM Based on Big Data Analysis

2017
Information security problem being more and more serious, plenty of data about security being produced fast, the Security Information and Event Management (SIEM) systems have faced with diversity of Volume Big data sources, so it is necessary that big data analysis should be used. This paper presents the architecture and principle of SIEM systems which
Leiming Yan, Tianmu Li
openaire   +2 more sources

A Novel and Comprehensive Evaluation Methodology for SIEM

2019
Many SIEM products have been produced. However, there is no comprehensive methodology to evaluate them. We present a novel and comprehensive three-dimensional methodology to evaluate SIEM products. We consider a SIEM product as a set of dimensions, namely capability, architectural component, and common feature, then subdivide each dimension-according ...
Amir Hossein Panahi   +2 more
openaire   +2 more sources

Security Information and Event Management (SIEM) Performance in on-Premises and Cloud Based SIEM: A Survey

Proceedings of the 1st International Conference on Artificial Intelligence for Internet of Things: Accelerating Innovation in Industry and Consumer Electronics, 2023
Ranjithkumar S, M. Mohankumar
openaire   +1 more source

Siems, Margarethe

2001
Harold Rosenthal, Alan Blyth
openaire   +1 more source

Home - About - Disclaimer - Privacy