Results 261 to 270 of about 102,611 (306)
Light SIEM for semiconductor industry [PDF]
Information security is the foundation of enterprise information framework, and a strong enterprise information framework benefits business growth. Information security management system combined with business data can provide more effective service for enterprise.
Xuan Zhu Sherry Zhu+3 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Intelligent-based SIEM security email alert
International Conference on Information and Communicatiaon Technology, 2023SIEM, or Security Information and Event Management, can be considered the latest cybersecurity technology in the security strategy that was taken and utilized mostly by professional cybersecurity teams.
Chyun Horng Chi+5 more
semanticscholar +1 more source
International Conference on Recent Advances and Innovations in Engineering, 2023
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata+4 more
semanticscholar +1 more source
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata+4 more
semanticscholar +1 more source
International Conference Computing Engineering and Design, 2023
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu+3 more
semanticscholar +1 more source
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu+3 more
semanticscholar +1 more source
An Ontology-Based Model for SIEM Environments [PDF]
The management of security events, from the analysis of attacks and risk to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, network and system devices are designed to be heterogeneous, with different characteristics and functionalities that increase the difficulty of ...
GONZALEZ GRANADILLO, Gustavo Daniel+3 more
openaire +2 more sources
The Applicability of a SIEM Solution: Requirements and Evaluation
2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2019The need for SIEM systems increased in the last few years, especially as cyber-attacks are evolving and targeting enterprises, which may cause discontinuity of their services, leakage of their data, and affect their reputation. Cybersecurity breaches can range from no or limited impact to stealing or manipulation of data, or even taking control of ...
Mokalled H+5 more
openaire +3 more sources
A viable SIEM approach for Android
2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015Mobile devices such as smartphones and tablet PCs are increasingly used for business purposes. However, the trustworthiness of operating systems and apps is controversial. They can constitute a threat to corporate networks and infrastructures, if they are not audited or monitored.
Schölzel, Markus+2 more
openaire +2 more sources
Проблемы внедрения SIEM-систем
ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ, 2023Данная статья рассматривает проблему экспертозависимости при эксплуатации SIEMсистем. Актуальность темы обусловлена увеличением значимости роли систем класса SIEM в условиях значительного роста числа компьютерных атак на ИТ-системы.
Д.А. Казьмин
semanticscholar +1 more source
Management and Monitoring Security Events in a Business Organization - SIEM system
International Convention on Information and Communication Technology, Electronics and Microelectronics, 2022Business organizations are increasingly facing advanced threats, which have been particularly affected by new circumstances such as remote work. In such circumstances, members of IT security need to have appropriate systems that are ready to respond to ...
A. Skendzic+2 more
semanticscholar +1 more source
The Analysis of Attacks Against Port 80 Webserver with SIEM Wazuh Using Detection and OSCAR Methods
2022 5th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), 2022The existence of the internet in the company leads data and information exchange activities easier. The ease to obtain company data and information which is not accompanied by information security awareness results in the emergence of data leaks and ...
Tri Suryantoro+2 more
semanticscholar +1 more source