Results 31 to 40 of about 110,735 (289)
Atas do XXVIII Seminário de Investigação em Educação Matemática [PDF]
Em 2017, realiza-se em Viseu, pela terceira vez, o Seminário de Investigação em Educação Matemática (SIEM), dinamizado pelo Grupo de Trabalho de Investigação (GTI) da Associação de Professores de Matemática (APM).
Gomes, Helena Margarida dos Santos Vasconcelos+5 more
core +1 more source
Overview of Security Information and Event Management Systems [PDF]
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj +1 more source
The article presents the method of forming associative rules from the database of the SIEM system for detecting cyber incidents, which is based on the theory of fuzzy sets and methods of data mining.
Ihor Subach, A. Mykytiuk
semanticscholar +1 more source
Emergence of Pediatric Melioidosis in Siem Reap, Cambodia [PDF]
We describe the first cases of pediatric melioidosis in Cambodia. Thirty-nine cases were diagnosed at the Angkor Hospital for Children, Siem Reap, between October 2005 and December 2008 after the introduction of microbiology capabilities. Median age was 7.8 years (range = 1.6–16.2 years), 15 cases were male (38%), and 4 cases had pre-existing ...
Pagnarith, Y+7 more
openaire +3 more sources
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko+3 more
doaj +1 more source
DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS
Cyber-attacks move towards a sophisticated, destructive, and persistent position, as in the case of Stuxnet, Dark Hotel, Poseidon, and Carbanak. These attacks are called Advanced Persistent Threats (APT) in which an intruder establishes an undetected ...
Adem Şi̇mşek, A. Koltuksuz
semanticscholar +1 more source
The Guidelines to Adopt an Applicable SIEM Solution
The need for SIEM (Security Information and even Management) systems increased in the last years. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution.
MOKALLED, HASSAN+5 more
openaire +4 more sources
Сучасна інформаційна інфраструктура складається з великої кількості систем та компонентів, що потребують постійного моніторингу та контролю. Для виявлення аналізу та усунення можливих кіберзагроз рекомендовано використовувати єдине спільне рішення – так ...
Sergiy Gnatyuk+4 more
doaj +1 more source
Les conférences de Siem Reap [PDF]
Pottier Christophe. Les conférences de Siem Reap. In: Bulletin de l'Ecole française d'Extrême-Orient. Tome 90-91, 2003. pp. 487-490.
openaire +6 more sources
Detection of Current Attacks in Active Directory Environment with Log Correlation Methods
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj