Results 31 to 40 of about 114,400 (283)
Social media and political involvement in Cambodia
A total of 1,300 students in Cambodia were surveyed regarding their opinions on social media and political trust, their feelings regarding social media use, engagement on social media, and interactive relationships with social media.
Bora Ly
doaj +1 more source
Overview of Security Information and Event Management Systems [PDF]
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj +1 more source
Сучасна інформаційна інфраструктура складається з великої кількості систем та компонентів, що потребують постійного моніторингу та контролю. Для виявлення аналізу та усунення можливих кіберзагроз рекомендовано використовувати єдине спільне рішення – так ...
Sergiy Gnatyuk+4 more
doaj +1 more source
DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS
Cyber-attacks move towards a sophisticated, destructive, and persistent position, as in the case of Stuxnet, Dark Hotel, Poseidon, and Carbanak. These attacks are called Advanced Persistent Threats (APT) in which an intruder establishes an undetected ...
Adem Şi̇mşek, A. Koltuksuz
semanticscholar +1 more source
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko+3 more
doaj +1 more source
La información de las organizaciones alojada en bases de datos es un activo muy Importante que debe ser resguardada de ataques cibernéticos. En la investigación se identificaron amenazas que pueden poner en peligro el motor de base de datos SQL Server ...
Franklin Edwin Vela Vela
doaj +1 more source
The Guidelines to Adopt an Applicable SIEM Solution
The need for SIEM (Security Information and even Management) systems increased in the last years. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution.
MOKALLED, HASSAN+5 more
openaire +4 more sources
Emergence of Pediatric Melioidosis in Siem Reap, Cambodia [PDF]
We describe the first cases of pediatric melioidosis in Cambodia. Thirty-nine cases were diagnosed at the Angkor Hospital for Children, Siem Reap, between October 2005 and December 2008 after the introduction of microbiology capabilities. Median age was 7.8 years (range = 1.6–16.2 years), 15 cases were male (38%), and 4 cases had pre-existing ...
Pagnarith, Y+7 more
openaire +3 more sources
METHOD AND MEANS OF SECURITY MONITORING IN A COMPUTER NETWORK BY SIEM MEANS
This work focuses on researching, analyzing, and enhancing methods and tools for security monitoring in computer networks. The study develops security monitoring tools and methods based on SIEM agents, improving the data normalization process from ...
L. Savytska+3 more
semanticscholar +1 more source
The article looks at the current supply of cyber defense to the databases of information and communication systems. The effectiveness of continuous visits to databases is analyzed.
I. Subach, O. Vlasenko
semanticscholar +1 more source