Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures
G González-Granadillo, S González-Zarzosa, R Diaz - Sensors, 2021 - mdpi.com
Security Information and Event Management (SIEM) systems have been widely deployed as
a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have …
a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have …
[HTML][HTML] A method for satellite time series anomaly detection based on fast-DTW and improved-KNN
CUI Langfu, Q Zhang, SHI Yan, Y Liman… - Chinese Journal of …, 2023 - Elsevier
In satellite anomaly detection, there are some problems such as unbalanced sample
distribution, fewer fault samples, and unobvious anomaly characteristics. These problems …
distribution, fewer fault samples, and unobvious anomaly characteristics. These problems …
Threat classification model for security information event management focusing on model efficiency
J Kim, HY Kwon - Computers & Security, 2022 - Elsevier
As various types of network threats have increased recently, manual threat response by
security analysts has become a limitation. To compensate for this, the importance of security …
security analysts has become a limitation. To compensate for this, the importance of security …
The functional safety assessment of cyber-physical system operation process described by Markov chain
The functional safety assessment is one of the primary tasks both at the design stage and at
the stage of operation of critical infrastructure at all levels. The article's main contribution is …
the stage of operation of critical infrastructure at all levels. The article's main contribution is …
Detection and quantification of anomalies in communication networks based on LSTM-ARIMA combined model
S Xue, H Chen, X Zheng - International Journal of Machine Learning and …, 2022 - Springer
The anomaly detection for communication networks is significant for improve the quality of
communication services and network reliability. However, traditional communication …
communication services and network reliability. However, traditional communication …
[PDF][PDF] A Survey on Network Security Monitoring: Tools and Functionalities
Recently, cybersecurity breaches have become more common, with varying levels of impact
ranging from simple to major losses of financial resources or data. The network …
ranging from simple to major losses of financial resources or data. The network …
[PDF][PDF] Malicious traffic compression and classification technique for secure internet of things
With the introduction of 5G technology, the application of Internet of Things (IoT) devices is
expanding to various industrial fields. However, introducing a robust, lightweight, low-cost …
expanding to various industrial fields. However, introducing a robust, lightweight, low-cost …
Investigation of cyber situation awareness via SIEM tools: a constructive review
U Ünal, CN Kahya, Y Kurtlutepe… - 2021 6th International …, 2021 - ieeexplore.ieee.org
Awareness, in the sense of security, builds the backbone of operations understanding the
current and future cyber activities. Situation awareness has become the focal point of …
current and future cyber activities. Situation awareness has become the focal point of …
A quantitative study of Cybersecurity Data Analytics System Success using partial least squares structural equation modeling
E De La Cruz - 2024 - search.proquest.com
This predictive correlational quantitative research study examined how compatibility,
perceived usefulness, perceived ease of use, top management support, trialability, learning …
perceived usefulness, perceived ease of use, top management support, trialability, learning …
[PDF][PDF] Design the IoT Botnet Defense Process for Cybersecurity in Smart City.
The smart city comprises various infrastructures, including healthcare, transportation,
manufacturing, and energy. A smart city's Internet of Things (IoT) environment constitutes a …
manufacturing, and energy. A smart city's Internet of Things (IoT) environment constitutes a …