Results 271 to 280 of about 102,611 (306)
Some of the next articles are maybe not open access.

Open source SIEM solutions for an enterprise

Information and Computer Security, 2022
Purpose The security of applications, systems and networks has always been the source of great concern for both enterprises and common users. Different security tools like intrusion detection system/intrusion prevention system and firewalls are ...
Aamna Tariq   +4 more
semanticscholar   +1 more source

Detection of Counter-Forensic Incidents Using Security Information and Incident Management (SIEM) Systems

2022 15th International Conference on Information Security and Cryptography (ISCTURKEY), 2022
Cyber criminals can use many different methods to completely lose their traces after their actions or to complicate the work of forensic experts. Detection of such suspected anti-forensic activities can guide the detection of cyber crimes that have been ...
Mustafa Çağrı Fanuscu   +2 more
semanticscholar   +1 more source

Integrating Next-Generation SIEM with Data Lakes and AI: Advancing Threat Detection and Response

Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023
The article focuses on how Next-Gen SIEM can be extended with Data Lakes and AI to improve threat detection and response in current threat landscapes.
Rahul Marri   +2 more
semanticscholar   +1 more source

$$\mathcal {B}$$SIEM-IoT: A Blockchain-Based and Distributed SIEM for the Internet of Things

2019
The paper at hand proposes \(\mathcal {B}\)SIEM-IoT, a Security Information and Event Management solution (SIEM) for the Internet of Things (IoT) relying on blockchain to store and access security events. The security events included in the blockchain are contributed by a number of IoT sentinels in charge of protecting a group of IoT devices.
Andrés Pardo Mesa   +3 more
openaire   +2 more sources

Developing SIEM and Log Management for Automotive Network in a Simulated Environment

Symposium on Intelligent Systems and Informatics
Modern vehicles' increasing connectivity and complexity have made them susceptible to various cyber threats. To address this, Security Information and Event Management systems (SIEM), commonly used in IT environments, are being adapted for the automotive
M. Saulaiman   +8 more
semanticscholar   +1 more source

Security monitoring and management based on the use of IBM QRadar SIEM system

Modern information security, 2022
The article clarifies general information about security monitoring and management (SIEM) systems; researched SIEM as a tool to achieve compliance with regulatory security requirements; studied the functionality of IBM QRadar as a typical SIEM sample.
A. Gunder
semanticscholar   +1 more source

Collaborative Detection of SQL Injection Attacks using SIEM, Multi-Wazuh Agents, and Diverse Web Application Firewalls

2024 5th International Conference on Communications, Information, Electronic and Energy Systems (CIEES)
SQL injection attacks pose a significant threat to web applications and database systems. This study evaluates the effectiveness of integrating Security Information and Event Management (SIEM) with multi-Wazuh agents and diverse Web Application Firewalls
Mustaghfir Naufal Zaidan   +2 more
semanticscholar   +1 more source

Learning to love SIEM

Network Security, 2011
In the 1964 motion picture, Dr Strangelove or: How I Learned to Stop Worrying and Love the Bomb, a paranoid general played by Sterling Hayden is able to hack into a system and initiate a nuclear attack on the Soviet Union without the knowledge of his superiors.
openaire   +2 more sources

Log collection and SIEM for 5G SOC

International Symposium on Applied Machine Intelligence and Informatics, 2022
Today, cyber-attacks are becoming more commonplace, more complex and sophisticated every year, bypassing or remaining hidden from traditional defensive tools (such as firewall, IDS/IPS and other malware detection tools).
Miklós Orsós   +3 more
semanticscholar   +1 more source

SIEM integration with SOAR

2022 International Conference on Futuristic Technologies (INCOFT), 2022
The reliance on basic perimeter controls is coming to an end, as it is no longer reliable to rely solely on the firewall, intrusion detection system, or antivirus.
Anish Sridharan, V. Kanchana
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy