Results 271 to 280 of about 102,611 (306)
Some of the next articles are maybe not open access.
Open source SIEM solutions for an enterprise
Information and Computer Security, 2022Purpose The security of applications, systems and networks has always been the source of great concern for both enterprises and common users. Different security tools like intrusion detection system/intrusion prevention system and firewalls are ...
Aamna Tariq+4 more
semanticscholar +1 more source
2022 15th International Conference on Information Security and Cryptography (ISCTURKEY), 2022
Cyber criminals can use many different methods to completely lose their traces after their actions or to complicate the work of forensic experts. Detection of such suspected anti-forensic activities can guide the detection of cyber crimes that have been ...
Mustafa Çağrı Fanuscu+2 more
semanticscholar +1 more source
Cyber criminals can use many different methods to completely lose their traces after their actions or to complicate the work of forensic experts. Detection of such suspected anti-forensic activities can guide the detection of cyber crimes that have been ...
Mustafa Çağrı Fanuscu+2 more
semanticscholar +1 more source
Integrating Next-Generation SIEM with Data Lakes and AI: Advancing Threat Detection and Response
Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023The article focuses on how Next-Gen SIEM can be extended with Data Lakes and AI to improve threat detection and response in current threat landscapes.
Rahul Marri+2 more
semanticscholar +1 more source
$$\mathcal {B}$$SIEM-IoT: A Blockchain-Based and Distributed SIEM for the Internet of Things
2019The paper at hand proposes \(\mathcal {B}\)SIEM-IoT, a Security Information and Event Management solution (SIEM) for the Internet of Things (IoT) relying on blockchain to store and access security events. The security events included in the blockchain are contributed by a number of IoT sentinels in charge of protecting a group of IoT devices.
Andrés Pardo Mesa+3 more
openaire +2 more sources
Developing SIEM and Log Management for Automotive Network in a Simulated Environment
Symposium on Intelligent Systems and InformaticsModern vehicles' increasing connectivity and complexity have made them susceptible to various cyber threats. To address this, Security Information and Event Management systems (SIEM), commonly used in IT environments, are being adapted for the automotive
M. Saulaiman+8 more
semanticscholar +1 more source
Security monitoring and management based on the use of IBM QRadar SIEM system
Modern information security, 2022The article clarifies general information about security monitoring and management (SIEM) systems; researched SIEM as a tool to achieve compliance with regulatory security requirements; studied the functionality of IBM QRadar as a typical SIEM sample.
A. Gunder
semanticscholar +1 more source
2024 5th International Conference on Communications, Information, Electronic and Energy Systems (CIEES)
SQL injection attacks pose a significant threat to web applications and database systems. This study evaluates the effectiveness of integrating Security Information and Event Management (SIEM) with multi-Wazuh agents and diverse Web Application Firewalls
Mustaghfir Naufal Zaidan+2 more
semanticscholar +1 more source
SQL injection attacks pose a significant threat to web applications and database systems. This study evaluates the effectiveness of integrating Security Information and Event Management (SIEM) with multi-Wazuh agents and diverse Web Application Firewalls
Mustaghfir Naufal Zaidan+2 more
semanticscholar +1 more source
Network Security, 2011
In the 1964 motion picture, Dr Strangelove or: How I Learned to Stop Worrying and Love the Bomb, a paranoid general played by Sterling Hayden is able to hack into a system and initiate a nuclear attack on the Soviet Union without the knowledge of his superiors.
openaire +2 more sources
In the 1964 motion picture, Dr Strangelove or: How I Learned to Stop Worrying and Love the Bomb, a paranoid general played by Sterling Hayden is able to hack into a system and initiate a nuclear attack on the Soviet Union without the knowledge of his superiors.
openaire +2 more sources
Log collection and SIEM for 5G SOC
International Symposium on Applied Machine Intelligence and Informatics, 2022Today, cyber-attacks are becoming more commonplace, more complex and sophisticated every year, bypassing or remaining hidden from traditional defensive tools (such as firewall, IDS/IPS and other malware detection tools).
Miklós Orsós+3 more
semanticscholar +1 more source
2022 International Conference on Futuristic Technologies (INCOFT), 2022
The reliance on basic perimeter controls is coming to an end, as it is no longer reliable to rely solely on the firewall, intrusion detection system, or antivirus.
Anish Sridharan, V. Kanchana
semanticscholar +1 more source
The reliance on basic perimeter controls is coming to an end, as it is no longer reliable to rely solely on the firewall, intrusion detection system, or antivirus.
Anish Sridharan, V. Kanchana
semanticscholar +1 more source