Results 281 to 290 of about 102,611 (306)
Some of the next articles are maybe not open access.

SIEM with LSA technique for Threat identification

2013 19th IEEE International Conference on Networks (ICON), 2013
Security in the heterogeneous and complex network is very challenged for administrators. They need to handle with a lot of devices, and perform the task of protection and prevention plan for securing the network from the threats. The Security Information and Event Management (SIEM) is one of the most common tools that helps administrators to deal with ...
Pavarit Dairinram   +2 more
openaire   +2 more sources

The evolution and application of SIEM systems

Network Security, 2014
Anyone in a data-driven job like security, fraud, business intelligence, performance monitoring or any other data-dependant field will have heard about the latest phenomenon of ‘big data’. This exciting technological breakthrough promises to make business more efficient, identify anything that might harm it well ahead of time, and predict the future ...
openaire   +2 more sources

Security Information and Event Management (SIEM)

Encyclopedia of Cryptography, Security and Privacy, 2021
Manfred Vielberth
openaire   +2 more sources

Enhancing SIEM Technology to Protect Critical Infrastructures

2013
Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory Control And Data Acquisition (SCADA) systems are increasing and becoming more sophisticated. Typically, SCADA has been designed without having security in mind, which is indeed approached by reusing solutions to protect solely Information Technology (IT) based ...
COPPOLINO, Luigi   +3 more
openaire   +3 more sources

New SIEM System for the Internet of Things

2019
Based on the available standards, the generalized architecture and the reference model of the IoT as a security object to be protected are presented. On the IoT layers, different security controls collecting data for further detection of security-related events are located.
Alexander Tolstoy, Natalia Miloslavskaya
openaire   +2 more sources

Why SIEM is Irreplaceable in a Secure IT Environment?

2019 Open Conference of Electrical, Electronic and Information Sciences (eStream), 2019
The aim of the publication is to brief on the importance of a SIEM (Security Information and Event Management) solution. Its benefits but also taking time to reflect on this system drawbacks. All of which is intended for those who are looking into cybersecurity solution that will learn from entire IT infrastructure and be able to identify anomalies ...
Oskars Podzins, Andrejs Romanovs
openaire   +2 more sources

Segmentation of vegetation scenes: the SIEMS method

SPIE Proceedings, 2012
This paper presents an unsupervised segmentation method dedicated to vegetation scenes with decametric or metric spatial resolutions. The proposed algorithm, named SIEMS, is based on the iterative use of the Expectation–Maximization algorithm and offers a good trade-off between oversegmentation and undersegmentation.
openaire   +2 more sources

Low-Cost Serverless SIEM in the Cloud

2019 38th Symposium on Reliable Distributed Systems (SRDS), 2019
Security systems such as the Security Information and Event Management (SIEMs) have been used to monitor logs and correlate data to quickly detect and respond to incidents. Despite their advantages, SIEMs are expensive to deploy and maintain, requiring extra budget and specialized staff.
Iberia Medeiros   +2 more
openaire   +2 more sources

Building better data protection with SIEM

Computer Fraud & Security, 2015
In today's data-rich enterprises, information is currency. This makes the requirement to protect it against external security threats more acute than ever. Already, the exponential increase in sophisticated data breaches seen in recent years has prompted IT and security administrators to move from simply being aware of the most up-to-date security ...
openaire   +2 more sources

A Novel and Comprehensive Evaluation Methodology for SIEM

2019
Many SIEM products have been produced. However, there is no comprehensive methodology to evaluate them. We present a novel and comprehensive three-dimensional methodology to evaluate SIEM products. We consider a SIEM product as a set of dimensions, namely capability, architectural component, and common feature, then subdivide each dimension-according ...
Amir Hossein Panahi   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy