Results 261 to 270 of about 102,611 (306)

Light SIEM for semiconductor industry [PDF]

open access: possible2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2017
Information security is the foundation of enterprise information framework, and a strong enterprise information framework benefits business growth. Information security management system combined with business data can provide more effective service for enterprise.
Xuan Zhu Sherry Zhu   +3 more
openaire   +1 more source

Intelligent-based SIEM security email alert

International Conference on Information and Communicatiaon Technology, 2023
SIEM, or Security Information and Event Management, can be considered the latest cybersecurity technology in the security strategy that was taken and utilized mostly by professional cybersecurity teams.
Chyun Horng Chi   +5 more
semanticscholar   +1 more source

A Log Aggregation Design Criteria for Robust SIEM (Security Information and Event Management) in Enhancing Threat Detection

International Conference on Recent Advances and Innovations in Engineering, 2023
Security Operations Centers (SOCs) play a vital role in protecting organizations from cyber threats. Supported by skilled Security Analysts, they are the first line of defense, monitoring and responding to incidents.
Mohsen Bin Mohamad Hata   +4 more
semanticscholar   +1 more source

Enhancing Security Information and Event Management (SIEM) by Incorporating Machine Learning for Cyber Attack Detection

International Conference Computing Engineering and Design, 2023
Network security is a crucial component of Information Technology, yet organizations continue to grapple with meeting established security benchmarks.
M. A. Ayu   +3 more
semanticscholar   +1 more source

An Ontology-Based Model for SIEM Environments [PDF]

open access: possible, 2012
The management of security events, from the analysis of attacks and risk to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, network and system devices are designed to be heterogeneous, with different characteristics and functionalities that increase the difficulty of ...
GONZALEZ GRANADILLO, Gustavo Daniel   +3 more
openaire   +2 more sources

The Applicability of a SIEM Solution: Requirements and Evaluation

2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2019
The need for SIEM systems increased in the last few years, especially as cyber-attacks are evolving and targeting enterprises, which may cause discontinuity of their services, leakage of their data, and affect their reputation. Cybersecurity breaches can range from no or limited impact to stealing or manipulation of data, or even taking control of ...
Mokalled H   +5 more
openaire   +3 more sources

A viable SIEM approach for Android

2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015
Mobile devices such as smartphones and tablet PCs are increasingly used for business purposes. However, the trustworthiness of operating systems and apps is controversial. They can constitute a threat to corporate networks and infrastructures, if they are not audited or monitored.
Schölzel, Markus   +2 more
openaire   +2 more sources

Проблемы внедрения SIEM-систем

ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ, 2023
Данная статья рассматривает проблему экспертозависимости при эксплуатации SIEMсистем. Актуальность темы обусловлена увеличением значимости роли систем класса SIEM в условиях значительного роста числа компьютерных атак на ИТ-системы.
Д.А. Казьмин
semanticscholar   +1 more source

Management and Monitoring Security Events in a Business Organization - SIEM system

International Convention on Information and Communication Technology, Electronics and Microelectronics, 2022
Business organizations are increasingly facing advanced threats, which have been particularly affected by new circumstances such as remote work. In such circumstances, members of IT security need to have appropriate systems that are ready to respond to ...
A. Skendzic   +2 more
semanticscholar   +1 more source

The Analysis of Attacks Against Port 80 Webserver with SIEM Wazuh Using Detection and OSCAR Methods

2022 5th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), 2022
The existence of the internet in the company leads data and information exchange activities easier. The ease to obtain company data and information which is not accompanied by information security awareness results in the emergence of data leaks and ...
Tri Suryantoro   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy