Results 41 to 50 of about 114,400 (283)
Les conférences de Siem Reap [PDF]
Pottier Christophe. Les conférences de Siem Reap. In: Bulletin de l'Ecole française d'Extrême-Orient. Tome 90-91, 2003. pp. 487-490.
openaire +6 more sources
The article presents the method of forming associative rules from the database of the SIEM system for detecting cyber incidents, which is based on the theory of fuzzy sets and methods of data mining.
Ihor Subach, A. Mykytiuk
semanticscholar +1 more source
Detection of Current Attacks in Active Directory Environment with Log Correlation Methods
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj
Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari+17 more
core +8 more sources
This article explores the internationalization of urban planning in Siem Reap, the town situated as the gateway to the Archaeological Park of Angkor. After Angkor was listed as a World Heritage Site in 1992, international donors and consultants have been
Adele Esposito
doaj +1 more source
Atas do XXVIII Seminário de Investigação em Educação Matemática [PDF]
Em 2017, realiza-se em Viseu, pela terceira vez, o Seminário de Investigação em Educação Matemática (SIEM), dinamizado pelo Grupo de Trabalho de Investigação (GTI) da Associação de Professores de Matemática (APM).
Gomes, Helena Margarida dos Santos Vasconcelos+5 more
core +1 more source
Harvesting the siem orange from its plants usually is not uniform. Citrus farmers sell their crops based on the request of the middlemen regardless of the age of harvest.
N. Handayani+2 more
semanticscholar +1 more source
A SIEM and Multiple Analysis Software Integrated Malware Detection Approach
The organization's IT systems, especially IT and OT combined systems have a large surface exposed to sophisticated cyber-attacks, such as Advanced Persistent Threats (APT) and malware variants.
Daiyu Sim, Huaqun Guo, Luying Zhou
semanticscholar +1 more source
Enhancing Cyber Resilience: Convergence of SIEM, SOAR, and AI in 2024
Purpose: The study aims to examine the synergistic effects of integrating Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and Artificial Intelligence (AI) technologies in enhancing cybersecurity ...
Shanmugavelan Ramakrishnan+1 more
semanticscholar +1 more source
Infection with Extended-spectrum beta-lactamase -producing Enterobacterales (ESBL-E) is common in infants and leads to increased intensive care unit admission and mortality, but the role of maternal transmission in colonization of infants is unclear ...
Chalita Chomkatekaew+12 more
doaj +1 more source