Results 81 to 90 of about 110,735 (289)

MuSec: Sonification of Alarms Generated by a SIEM [PDF]

open access: yes, 2017
The information generated by a network monitoring system is overwhelming. Monitoring is imperative but very difficult to accomplish due to several reasons. More so for the case of non tech-savvy home users. Security Information Event Management applications generate alarms that correlate multiple occurrences on the network.
António Pinto, Luís de Sousa
openaire   +2 more sources

Toward an Efficient Ontology-Based Event Correlation in SIEM [PDF]

open access: yesProcedia Computer Science, 2016
Cooperative intrusion detection use several intrusion detection systems (IDS) and analyzers in order to build a reliable overview of the monitored system trough a central security information and event management system (SIEM). In such environment, the definition of a shared vocabulary describing the exchanged information between tools is prominent ...
Tayeb Kenaza, Mahdi Aiash
openaire   +2 more sources

Global developments in the regulation of cultivated meat: A comparative study of the EU, Singapore, US and Australia and New Zealand

open access: yesReview of European, Comparative &International Environmental Law, EarlyView.
Abstract Cultivated meat, that is, animal flesh grown through cell culturing techniques, also termed cellular agriculture, is positioned by proponents, developers and some governments as the future of food and the solution to the multiple environmental issues associated with intensive animal agriculture.
Hope Johnson, Alessandro Monaco
wiley   +1 more source

Zero Trust Architecture as a Risk Countermeasure in Small–Medium Enterprises and Advanced Technology Systems

open access: yesRisk Analysis, EarlyView.
Abstract The growing sophistication of cyberattacks exposes small‐ and medium‐sized businesses (SMBs) to a widening range of security risks. As these threats evolve in complexity, the need for advanced security measures becomes increasingly pressing. This necessitates a proactive approach to defending against potential cyber intrusions.
Ahmed M. Abdelmagid, Rafael Diaz
wiley   +1 more source

High survival and treatment success sustained after two and three years of first‐line ART for children in Cambodia

open access: yesJournal of the International AIDS Society, 2010
Background Long‐term outcomes of antiretroviral therapy (ART) in children remain poorly documented in resource‐limited settings. The objective of this study was to assess two‐and three‐year survival, CD4 evolution and virological response among children ...
Petros Isaakidis   +8 more
doaj   +1 more source

Placental mitochondrial metabolic adaptation maintains cellular energy balance in pregnancy complicated by gestational hypoxia

open access: yesThe Journal of Physiology, EarlyView.
Abstract figure legend Placental mitochondrial adaptation to gestational hypoxia. Hypoxic pregnancy in sheep increases placental insulin like growth factor 2 (IGF2) signalling (1), which is associated with a shift in capacity away from β‐oxidation (2) and complex I‐mediated respiration (3), while maintaining total oxidative phosphorylation capacity (4).
Wen Tong   +18 more
wiley   +1 more source

El Laboratorio Foster de la Residencia de Señoritas. Las relaciones de la JAE con el International Institute for Girls in Spain, y la formación de las jóvenes científicas españolas

open access: yesAsclepio: Revista de Historia de la Medicina y de la Ciencia, 2007
En el primer tercio del siglo XX crecieron diversas líneas de relación entre las universitarias norteamericanas y españolas; en particular, la que se estableció entre la Junta para Ampliación de Estudios e Investigaciones Científicas (JAE) y el ...
Carmen Magallón Portolés
doaj   +1 more source

Revolutionizing Cyber Defense: Leveraging Generative AI for Adaptive Threat Hunting

open access: yesInternet Technology Letters, Volume 8, Issue 4, July/August 2025.
ABSTRACT Adaptive threat hunting, powered by Generative AI (GenAI), is reshaping the cybersecurity landscape, equipping analysts with the tools to predict, detect, and dynamically mitigate cyber threats. Adaptive threat hunting is critical because it enables an organization to detect threats proactively in the infrastructure, thereby reducing the risks
Aditya K. Sood, Sherali Zeadally
wiley   +1 more source

Gestión automatizada e integrada de controles de seguridad informática

open access: yesRevista Ingeniería Electrónica, Automática y Comunicaciones, 2013
En el presente trabajo se propone un modelo para la gestión automatizada e integrada de controles de seguridad informática, basado en sistemas de gestión de información y eventos de seguridad (SIEM), que posibilita aumentar la efectividad de los ...
Raydel Montesino Perurena   +2 more
doaj   +1 more source

Cost‐effectiveness analysis of a community‐based model for delivery of antiretroviral therapy to people with clinically stable HIV in Cambodia

open access: yesJournal of the International AIDS Society, Volume 28, Issue S3, July 2025.
Abstract Introduction In Cambodia, of all people living with HIV, 89% knew their status, 89% were receiving antiretroviral therapy (ART) and 87% had their viral load suppressed in 2023. In 2017, the national HIV programme introduced the multi‐month dispensing (MMD) model to reduce visits to ART clinics, thereby reducing the burden on people living with
Lo Yan Esabelle Yam   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy