Results 261 to 270 of about 110,735 (289)
Some of the next articles are maybe not open access.

Detection of Counter-Forensic Incidents Using Security Information and Incident Management (SIEM) Systems

2022 15th International Conference on Information Security and Cryptography (ISCTURKEY), 2022
Cyber criminals can use many different methods to completely lose their traces after their actions or to complicate the work of forensic experts. Detection of such suspected anti-forensic activities can guide the detection of cyber crimes that have been ...
Mustafa Çağrı Fanuscu   +2 more
semanticscholar   +1 more source

SIEM with LSA technique for Threat identification

2013 19th IEEE International Conference on Networks (ICON), 2013
Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with ...
Pavarit Dairinram   +2 more
openaire   +2 more sources

An Ontology-Based Model for SIEM Environments [PDF]

open access: possible, 2012
The management of security events, from the analysis of attacks and risk to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, network and system devices are designed to be heterogeneous, with different characteristics and functionalities that increase the difficulty of ...
Nabil Hachem   +3 more
openaire   +1 more source

The evolution and application of SIEM systems

Network Security, 2014
Anyone in a data-driven job like security, fraud, business intelligence, performance monitoring or any other data-dependant field will have heard about the latest phenomenon of ‘big data’. This exciting technological breakthrough promises to make business more efficient, identify anything that might harm it well ahead of time, and predict the future ...
openaire   +2 more sources

Enhancing SIEM Technology to Protect Critical Infrastructures

2013
Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory Control And Data Acquisition (SCADA) systems are increasing and becoming more sophisticated. Typically, SCADA has been designed without having security in mind, which is indeed approached by reusing solutions to protect solely Information Technology (IT) based ...
COPPOLINO, Luigi   +3 more
openaire   +3 more sources

New SIEM System for the Internet of Things

2019
Based on the available standards, the generalized architecture and the reference model of the IoT as a security object to be protected are presented. On the IoT layers, different security controls collecting data for further detection of security-related events are located.
Alexander Tolstoy, Natalia Miloslavskaya
openaire   +2 more sources

Why SIEM is Irreplaceable in a Secure IT Environment?

2019 Open Conference of Electrical, Electronic and Information Sciences (eStream), 2019
The aim of the publication is to brief on the importance of a SIEM (Security Information and Event Management) solution. Its benefits but also taking time to reflect on this system drawbacks. All of which is intended for those who are looking into cybersecurity solution that will learn from entire IT infrastructure and be able to identify anomalies ...
Oskars Podzins, Andrejs Romanovs
openaire   +2 more sources

Segmentation of vegetation scenes: the SIEMS method

SPIE Proceedings, 2012
This paper presents an unsupervised segmentation method dedicated to vegetation scenes with decametric or metric spatial resolutions. The proposed algorithm, named SIEMS, is based on the iterative use of the Expectation–Maximization algorithm and offers a good trade-off between oversegmentation and undersegmentation.
openaire   +2 more sources

Low-Cost Serverless SIEM in the Cloud

2019 38th Symposium on Reliable Distributed Systems (SRDS), 2019
Security systems such as the Security Information and Event Management (SIEMs) have been used to monitor logs and correlate data to quickly detect and respond to incidents. Despite their advantages, SIEMs are expensive to deploy and maintain, requiring extra budget and specialized staff.
Iberia Medeiros   +2 more
openaire   +2 more sources

Perancangan dan Pengembangan Aplikasi Deteksi Anomali pada Jaringan Internet Gedung Disaster Recovery Center Badan Diklat Kejaksaan RI dengan Implementasi Sistem Manajemen Informasi dan Keamanan (SIEM) Berbasis Web

Jurnal Ilmu Komputer dan Teknologi Informasi
This research develops an anomaly detection application for the internet network of the Disaster Recovery Center (DRC) building at the Training Agency of the Indonesian Prosecutor's Office (Badan Diklat Kejaksaan RI), implemented with Security ...
Issenoro   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy