Results 31 to 40 of about 114,400 (283)

Social media and political involvement in Cambodia

open access: yesCogent Social Sciences, 2023
A total of 1,300 students in Cambodia were surveyed regarding their opinions on social media and political trust, their feelings regarding social media use, engagement on social media, and interactive relationships with social media.
Bora Ly
doaj   +1 more source

Overview of Security Information and Event Management Systems [PDF]

open access: yesInformatică economică
Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge.
Cosmin MACANEATA
doaj   +1 more source

СИСТЕМА КОРЕЛЮВАННЯ ПОДІЙ ТА УПРАВЛІННЯ ІНЦИДЕНТАМИ КІБЕРБЕЗПЕКИ НА ОБ’ЄКТАХ КРИТИЧНОЇ ІНФРАСТРУКТУРИ

open access: yesКібербезпека: освіта, наука, техніка, 2023
Сучасна інформаційна інфраструктура складається з великої кількості систем та компонентів, що потребують постійного моніторингу та контролю. Для виявлення аналізу та усунення можливих кіберзагроз рекомендовано використовувати єдине спільне рішення – так ...
Sergiy Gnatyuk   +4 more
doaj   +1 more source

DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS

open access: yesPIRETC-Proceeding of The International Research Education & Training Centre, 2023
Cyber-attacks move towards a sophisticated, destructive, and persistent position, as in the case of Stuxnet, Dark Hotel, Poseidon, and Carbanak. These attacks are called Advanced Persistent Threats (APT) in which an intruder establishes an undetected ...
Adem Şi̇mşek, A. Koltuksuz
semanticscholar   +1 more source

Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems

open access: yesFuture Internet, 2013
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko   +3 more
doaj   +1 more source

Estudio de un sistema de seguridad de información y administración de eventos para base de datos SQL server. Caso de estudio: entidad pública

open access: yesRevista Odigos, 2023
La información de las organizaciones alojada en bases de datos es un activo muy Importante que debe ser resguardada de ataques cibernéticos. En la investigación se identificaron amenazas que pueden poner en peligro el motor de base de datos SQL Server ...
Franklin Edwin Vela Vela
doaj   +1 more source

The Guidelines to Adopt an Applicable SIEM Solution

open access: yesJournal of Information Security, 2020
The need for SIEM (Security Information and even Management) systems increased in the last years. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution.
MOKALLED, HASSAN   +5 more
openaire   +4 more sources

Emergence of Pediatric Melioidosis in Siem Reap, Cambodia [PDF]

open access: yesThe American Society of Tropical Medicine and Hygiene, 2010
We describe the first cases of pediatric melioidosis in Cambodia. Thirty-nine cases were diagnosed at the Angkor Hospital for Children, Siem Reap, between October 2005 and December 2008 after the introduction of microbiology capabilities. Median age was 7.8 years (range = 1.6–16.2 years), 15 cases were male (38%), and 4 cases had pre-existing ...
Pagnarith, Y   +7 more
openaire   +3 more sources

METHOD AND MEANS OF SECURITY MONITORING IN A COMPUTER NETWORK BY SIEM MEANS

open access: yesInformation Technology and Computer Engineering, 2023
This work focuses on researching, analyzing, and enhancing methods and tools for security monitoring in computer networks. The study develops security monitoring tools and methods based on SIEM agents, improving the data normalization process from ...
L. Savytska   +3 more
semanticscholar   +1 more source

Architecture of intelligent SIEM for detecting cyber incidents in databases of military information and communication systems.

open access: yesCommunication, informatization and cybersecurity systems and technologies, 2023
The article looks at the current supply of cyber defense to the databases of information and communication systems. The effectiveness of continuous visits to databases is analyzed.
I. Subach, O. Vlasenko
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy