Results 21 to 30 of about 110,052 (200)

СИСТЕМА КОРЕЛЮВАННЯ ПОДІЙ ТА УПРАВЛІННЯ ІНЦИДЕНТАМИ КІБЕРБЕЗПЕКИ НА ОБ’ЄКТАХ КРИТИЧНОЇ ІНФРАСТРУКТУРИ

open access: yesКібербезпека: освіта, наука, техніка, 2023
Сучасна інформаційна інфраструктура складається з великої кількості систем та компонентів, що потребують постійного моніторингу та контролю. Для виявлення аналізу та усунення можливих кіберзагроз рекомендовано використовувати єдине спільне рішення – так ...
Sergiy Gnatyuk   +4 more
doaj   +1 more source

Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems

open access: yesFuture Internet, 2013
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko   +3 more
doaj   +1 more source

Atas do XXVIII Seminário de Investigação em Educação Matemática [PDF]

open access: yes, 2017
Em 2017, realiza-se em Viseu, pela terceira vez, o Seminário de Investigação em Educação Matemática (SIEM), dinamizado pelo Grupo de Trabalho de Investigação (GTI) da Associação de Professores de Matemática (APM).
Gomes, Helena Margarida dos Santos Vasconcelos   +5 more
core   +1 more source

Estudio de un sistema de seguridad de información y administración de eventos para base de datos SQL server. Caso de estudio: entidad pública

open access: yesRevista Odigos, 2023
La información de las organizaciones alojada en bases de datos es un activo muy Importante que debe ser resguardada de ataques cibernéticos. En la investigación se identificaron amenazas que pueden poner en peligro el motor de base de datos SQL Server ...
Franklin Edwin Vela Vela
doaj   +1 more source

Detection of Current Attacks in Active Directory Environment with Log Correlation Methods

open access: yesHavacılık ve Uzay Teknolojileri Dergisi, 2023
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj  

Planning Urban Development from an Outsider’s Perspective: Siem Reap, the Backdrop of Changing Urban Representations

open access: yesAntropologia, 2014
This article explores the internationalization of urban planning in Siem Reap, the town situated as the gateway to the Archaeological Park of Angkor. After Angkor was listed as a World Heritage Site in 1992, international donors and consultants have been
Adele Esposito
doaj   +1 more source

Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web

open access: yesJ-Intech (Journal of Information and Technology), 2023
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj   +1 more source

Deteksi Menggunakan Pcr (Polymerase Chain Reaction) Candidatus Liberibacter Asiaticus, Penyebab Huanglongbing Pada Jeruk Siem Dengan Beberapa Tipe Gejala Pada Daun [PDF]

open access: yes, 2010
Detection using PCR (Polymerase Chain Reaction) Candidatus Liberibacter asiaticus, Huanglongbing causal Organism on Siem Mandarin with different types of symptoms.
Yohanes Andi Trisyono & Andrew Beattie., Achmad Himawan, Yohanes Berchmans umardiyono, Susamto Somowiyarjo
core   +2 more sources

Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response

open access: yesApplied Sciences, 2023
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban   +3 more
doaj   +1 more source

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

open access: yesApplied Sciences, 2023
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy