Systematic review of SIEM technology: SIEM-SC birth

JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

ARIES: A novel multivariate intrusion detection system for smart grid

P Radoglou Grammatikis, P Sarigiannidis… - Sensors, 2020 - mdpi.com
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to
devastating consequences. In this paper, we present a novel anomaly-based Intrusion …

Economic, environmental and social gains of the implementation of artificial intelligence at dam operations toward Industry 4.0 principles

MG Gomes, VHC da Silva, LFR Pinto, P Centoamore… - Sustainability, 2020 - mdpi.com
Due to the increasing demand for water supply of urban areas, treatment and supply plants
are becoming important to ensure availability and quality of this essential resource for …

Threat hunting architecture using a machine learning approach for critical infrastructures protection

M Aragonés Lozano, I Pérez Llopis… - Big data and cognitive …, 2023 - mdpi.com
The number and the diversity in nature of daily cyber-attacks have increased in the last few
years, and trends show that both will grow exponentially in the near future. Critical …

An OpenNCP-based solution for secure eHealth data exchange

M Staffa, L Sgaglione, G Mazzeo, L Coppolino… - Journal of Network and …, 2018 - Elsevier
Abstract The European Commission is very focused on the development of possible
solutions to allow effective cross-border healthcare provisioning with the aim of …

[PDF][PDF] KONFIDO: An OpenNCP-based secure eHealth data exchange system

M Staffa, L Coppolino, L Sgaglione… - Security in Computer …, 2018 - library.oapen.org
Allowing cross-border health-care data exchange by establishing a uniform QoS level of
health-care systems across European states, represents one of the current main goals of the …

Near-miss situation based visual analysis of SIEM rules for real time network security monitoring

A Majeed, R ur Rasool, F Ahmad, M Alam… - Journal of Ambient …, 2019 - Springer
Security information and event management (SIEM) systems are generally used to monitor
the network for malicious activities. These systems are capable of detecting a wide range of …

Enhancing SIEM technology to protect critical infrastructures

L Coppolino, S D'Antonio, V Formicola… - … Security: 7th International …, 2013 - Springer
Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory
Control And Data Acquisition (SCADA) systems are increasing and becoming more …

[PDF][PDF] A trusted information agent for security information and event management

L Coppolino, N Kuntze, R Rieke - … ANALYSIS OF SYSTEM …, 2014 - archiv.ub.uni-marburg.de
This paper addresses security information management in untrusted environments. A
security information and event management system collects and examines security related …