Systematic review of SIEM technology: SIEM-SC birth
JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …
System Information and Event Management (SIEM) technology and what may possibly be …
A security monitoring system for internet of things
The wide adoption of the Internet of Things (IoT) paradigm in several application domains
has raised new security issues, which should be carefully taken into account to achieve a …
has raised new security issues, which should be carefully taken into account to achieve a …
An OpenNCP-based solution for secure eHealth data exchange
Abstract The European Commission is very focused on the development of possible
solutions to allow effective cross-border healthcare provisioning with the aim of …
solutions to allow effective cross-border healthcare provisioning with the aim of …
[PDF][PDF] 工业控制系统安全态势感知技术研究
周明, 吕世超, 游建舟, 朱红松, 石志强… - Journal of Cyber Security …, 2022 - jcs.iie.ac.cn
摘要工业控制系统(简称工控) 是国家关键基础设施的核心, 越来越多的工作开始关注工控系统
安全. 然而, 这些工作的实际应用场景并不统一, 因此他们取得的成果无法相互借鉴 …
安全. 然而, 这些工作的实际应用场景并不统一, 因此他们取得的成果无法相互借鉴 …
[PDF][PDF] KONFIDO: An OpenNCP-based secure eHealth data exchange system
Allowing cross-border health-care data exchange by establishing a uniform QoS level of
health-care systems across European states, represents one of the current main goals of the …
health-care systems across European states, represents one of the current main goals of the …
An intrusion response approach for elastic applications based on reinforcement learning
S Iannucci, E Casalicchio… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Intrusion Response is a relatively new field of research. Several model-based techniques
have been proposed that range from static mapping to complex stateful approaches …
have been proposed that range from static mapping to complex stateful approaches …
[PDF][PDF] Метод и алгоритмы управления рисками информационной безопасности АСУ ТП критических инфраструктур
АС Римша - 2021 - sut.ru
Актуальность темы исследования. Автоматизированная система управления (АСУ)
технологическими процессами (ТП)–это совокупность технических и программных …
технологическими процессами (ТП)–это совокупность технических и программных …
Facing cyber-physical security threats by PSIM-SIEM integration
F Frattini, U Giordano, V Conti - 2019 15th European …, 2019 - ieeexplore.ieee.org
Physical Protection Systems are Physical Systems that evolved towards the cyber world.
Sensors, cameras, barriers and control panels are now networked, making up a monitoring …
Sensors, cameras, barriers and control panels are now networked, making up a monitoring …
Use of the dempster-shafer theory for fraud detection: the mobile money transfer case study
Abstract Security Information and Event Management (SIEM) systems are largely used to
process logs generated by both hardware and software devices to assess the security level …
process logs generated by both hardware and software devices to assess the security level …
[HTML][HTML] Anomaly detection trusted hardware sensors for critical infrastructure legacy devices
Critical infrastructures and associated real time Informational systems need some security
protection mechanisms that will be able to detect and respond to possible attacks. For this …
protection mechanisms that will be able to detect and respond to possible attacks. For this …