Results 21 to 30 of about 113,074 (208)
Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari +17 more
core +9 more sources
Сучасна інформаційна інфраструктура складається з великої кількості систем та компонентів, що потребують постійного моніторингу та контролю. Для виявлення аналізу та усунення можливих кіберзагроз рекомендовано використовувати єдине спільне рішення – так ...
Sergiy Gnatyuk +4 more
doaj +1 more source
This article explores the internationalization of urban planning in Siem Reap, the town situated as the gateway to the Archaeological Park of Angkor. After Angkor was listed as a World Heritage Site in 1992, international donors and consultants have been
Adele Esposito
doaj +1 more source
Deteksi Menggunakan Pcr (Polymerase Chain Reaction) Candidatus Liberibacter Asiaticus, Penyebab Huanglongbing Pada Jeruk Siem Dengan Beberapa Tipe Gejala Pada Daun [PDF]
Detection using PCR (Polymerase Chain Reaction) Candidatus Liberibacter asiaticus, Huanglongbing causal Organism on Siem Mandarin with different types of symptoms.
Yohanes Andi Trisyono & Andrew Beattie., Achmad Himawan, Yohanes Berchmans umardiyono, Susamto Somowiyarjo
core +2 more sources
Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj +1 more source
Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications.
Emmanuel Tuyishime +4 more
doaj +1 more source
Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Di Sarno, Cesario +4 more
core +1 more source
Optoelectronic synaptic devices based on solution‐processed molecular telluride GST‐225 phase‐change inks are demonstrated for three‐factor learning. A global optical signal broadcast through a silicon waveguide induces non‐volatile conductance updates exclusively in locally electrically flagged memristors.
Kevin Portner +14 more
wiley +1 more source
Breaking Alert Fatigue: AI-Assisted SIEM Framework for Effective Incident Response
Contemporary security information and event management (SIEM) solutions struggle to identify critical security incidents effectively due to the overwhelming number of false alerts generated by disparate security products, which results in significant ...
Tao Ban +3 more
doaj +1 more source
Security Information and Event Management -järjestelmät [PDF]
Opinnäytetyö tehtiin Itä-Suomen yliopistolle, jolla on tarve keskitettyyn lokienhallintaan ja tietoturvan monitorointiin. Työn päätavoitteena on toimia apuvälineenä Security Information and Event Management -järjestelmiin perehtymiseen. Tästä aiheesta on
Ryynänen, Perttu, Tuupanen, Markus
core

