Systematic review of SIEM technology: SIEM-SC birth
JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …
System Information and Event Management (SIEM) technology and what may possibly be …
[图书][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …
ARIES: A novel multivariate intrusion detection system for smart grid
P Radoglou Grammatikis, P Sarigiannidis… - Sensors, 2020 - mdpi.com
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to
devastating consequences. In this paper, we present a novel anomaly-based Intrusion …
devastating consequences. In this paper, we present a novel anomaly-based Intrusion …
Economic, environmental and social gains of the implementation of artificial intelligence at dam operations toward Industry 4.0 principles
MG Gomes, VHC da Silva, LFR Pinto, P Centoamore… - Sustainability, 2020 - mdpi.com
Due to the increasing demand for water supply of urban areas, treatment and supply plants
are becoming important to ensure availability and quality of this essential resource for …
are becoming important to ensure availability and quality of this essential resource for …
Threat hunting architecture using a machine learning approach for critical infrastructures protection
M Aragonés Lozano, I Pérez Llopis… - Big data and cognitive …, 2023 - mdpi.com
The number and the diversity in nature of daily cyber-attacks have increased in the last few
years, and trends show that both will grow exponentially in the near future. Critical …
years, and trends show that both will grow exponentially in the near future. Critical …
An OpenNCP-based solution for secure eHealth data exchange
Abstract The European Commission is very focused on the development of possible
solutions to allow effective cross-border healthcare provisioning with the aim of …
solutions to allow effective cross-border healthcare provisioning with the aim of …
[PDF][PDF] KONFIDO: An OpenNCP-based secure eHealth data exchange system
Allowing cross-border health-care data exchange by establishing a uniform QoS level of
health-care systems across European states, represents one of the current main goals of the …
health-care systems across European states, represents one of the current main goals of the …
Near-miss situation based visual analysis of SIEM rules for real time network security monitoring
A Majeed, R ur Rasool, F Ahmad, M Alam… - Journal of Ambient …, 2019 - Springer
Security information and event management (SIEM) systems are generally used to monitor
the network for malicious activities. These systems are capable of detecting a wide range of …
the network for malicious activities. These systems are capable of detecting a wide range of …
Enhancing SIEM technology to protect critical infrastructures
Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory
Control And Data Acquisition (SCADA) systems are increasing and becoming more …
Control And Data Acquisition (SCADA) systems are increasing and becoming more …
[PDF][PDF] A trusted information agent for security information and event management
This paper addresses security information management in untrusted environments. A
security information and event management system collects and examines security related …
security information and event management system collects and examines security related …