Results 31 to 40 of about 110,735 (289)

Atas do XXVIII Seminário de Investigação em Educação Matemática [PDF]

open access: yes, 2017
Em 2017, realiza-se em Viseu, pela terceira vez, o Seminário de Investigação em Educação Matemática (SIEM), dinamizado pelo Grupo de Trabalho de Investigação (GTI) da Associação de Professores de Matemática (APM).
Gomes, Helena Margarida dos Santos Vasconcelos   +5 more
core   +1 more source

Overview of Security Information and Event Management Systems [PDF]

open access: yesInformatică economică
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj   +1 more source

Methodology of formation of fuzzy associative rules with weighted attributes from SIEM database for detection of cyber incidents in special information and communication systems

open access: yesCollection Information technology and security, 2023
The article presents the method of forming associative rules from the database of the SIEM system for detecting cyber incidents, which is based on the theory of fuzzy sets and methods of data mining.
Ihor Subach, A. Mykytiuk
semanticscholar   +1 more source

Emergence of Pediatric Melioidosis in Siem Reap, Cambodia [PDF]

open access: yesThe American Society of Tropical Medicine and Hygiene, 2010
We describe the first cases of pediatric melioidosis in Cambodia. Thirty-nine cases were diagnosed at the Angkor Hospital for Children, Siem Reap, between October 2005 and December 2008 after the introduction of microbiology capabilities. Median age was 7.8 years (range = 1.6–16.2 years), 15 cases were male (38%), and 4 cases had pre-existing ...
Pagnarith, Y   +7 more
openaire   +3 more sources

Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems

open access: yesFuture Internet, 2013
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko   +3 more
doaj   +1 more source

DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS

open access: yesPIRETC-Proceeding of The International Research Education & Training Centre, 2023
Cyber-attacks move towards a sophisticated, destructive, and persistent position, as in the case of Stuxnet, Dark Hotel, Poseidon, and Carbanak. These attacks are called Advanced Persistent Threats (APT) in which an intruder establishes an undetected ...
Adem Şi̇mşek, A. Koltuksuz
semanticscholar   +1 more source

The Guidelines to Adopt an Applicable SIEM Solution

open access: yesJournal of Information Security, 2020
The need for SIEM (Security Information and even Management) systems increased in the last years. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution.
MOKALLED, HASSAN   +5 more
openaire   +4 more sources

СИСТЕМА КОРЕЛЮВАННЯ ПОДІЙ ТА УПРАВЛІННЯ ІНЦИДЕНТАМИ КІБЕРБЕЗПЕКИ НА ОБ’ЄКТАХ КРИТИЧНОЇ ІНФРАСТРУКТУРИ

open access: yesКібербезпека: освіта, наука, техніка, 2023
Сучасна інформаційна інфраструктура складається з великої кількості систем та компонентів, що потребують постійного моніторингу та контролю. Для виявлення аналізу та усунення можливих кіберзагроз рекомендовано використовувати єдине спільне рішення – так ...
Sergiy Gnatyuk   +4 more
doaj   +1 more source

Les conférences de Siem Reap [PDF]

open access: yesBulletin de l'Ecole française d'Extrême-Orient, 2003
Pottier Christophe. Les conférences de Siem Reap. In: Bulletin de l'Ecole française d'Extrême-Orient. Tome 90-91, 2003. pp. 487-490.
openaire   +6 more sources

Detection of Current Attacks in Active Directory Environment with Log Correlation Methods

open access: yesHavacılık ve Uzay Teknolojileri Dergisi, 2023
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj  

Home - About - Disclaimer - Privacy