Results 21 to 30 of about 113,074 (208)

Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]

open access: yes, 2019
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari   +17 more
core   +9 more sources

СИСТЕМА КОРЕЛЮВАННЯ ПОДІЙ ТА УПРАВЛІННЯ ІНЦИДЕНТАМИ КІБЕРБЕЗПЕКИ НА ОБ’ЄКТАХ КРИТИЧНОЇ ІНФРАСТРУКТУРИ

open access: yesКібербезпека: освіта, наука, техніка, 2023
Сучасна інформаційна інфраструктура складається з великої кількості систем та компонентів, що потребують постійного моніторингу та контролю. Для виявлення аналізу та усунення можливих кіберзагроз рекомендовано використовувати єдине спільне рішення – так ...
Sergiy Gnatyuk   +4 more
doaj   +1 more source

Planning Urban Development from an Outsider’s Perspective: Siem Reap, the Backdrop of Changing Urban Representations

open access: yesAntropologia, 2014
This article explores the internationalization of urban planning in Siem Reap, the town situated as the gateway to the Archaeological Park of Angkor. After Angkor was listed as a World Heritage Site in 1992, international donors and consultants have been
Adele Esposito
doaj   +1 more source

Deteksi Menggunakan Pcr (Polymerase Chain Reaction) Candidatus Liberibacter Asiaticus, Penyebab Huanglongbing Pada Jeruk Siem Dengan Beberapa Tipe Gejala Pada Daun [PDF]

open access: yes, 2010
Detection using PCR (Polymerase Chain Reaction) Candidatus Liberibacter asiaticus, Huanglongbing causal Organism on Siem Mandarin with different types of symptoms.
Yohanes Andi Trisyono & Andrew Beattie., Achmad Himawan, Yohanes Berchmans umardiyono, Susamto Somowiyarjo
core   +2 more sources

Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web

open access: yesJournal of Information and Technology, 2023
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj   +1 more source

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

open access: yesApplied Sciences, 2023
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime   +4 more
doaj   +1 more source

Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]

open access: yes, 2014
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Di Sarno, Cesario   +4 more
core   +1 more source

Optoelectronic Synaptic Devices Using Molecular Telluride Phase‐Change Inks for Three‐Factor Learning

open access: yesAdvanced Functional Materials, EarlyView.
Optoelectronic synaptic devices based on solution‐processed molecular telluride GST‐225 phase‐change inks are demonstrated for three‐factor learning. A global optical signal broadcast through a silicon waveguide induces non‐volatile conductance updates exclusively in locally electrically flagged memristors.
Kevin Portner   +14 more
wiley   +1 more source

Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response

open access: yesApplied Sciences, 2023
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban   +3 more
doaj   +1 more source

Security Information and Event Management -järjestelmät [PDF]

open access: yes, 2015
Opinnäytetyö tehtiin Itä-Suomen yliopistolle, jolla on tarve keskitettyyn lokienhallintaan ja tietoturvan monitorointiin. Työn päätavoitteena on toimia apuvälineenä Security Information and Event Management -järjestelmiin perehtymiseen. Tästä aiheesta on
Ryynänen, Perttu, Tuupanen, Markus
core  

Home - About - Disclaimer - Privacy