Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A principal component analysis of barriers to the implementation of blockchain technology in the South African built environment
Purpose Blockchain technology is one of the emerging innovative technologies making
waves globally, and it has been adjudged to have the capability to transform businesses …
waves globally, and it has been adjudged to have the capability to transform businesses …
A secure and auditable logging infrastructure based on a permissioned blockchain
Abstract Information systems in organizations are regularly subject to cyber attacks targeting
confidential data or threatening the availability of the infrastructure. In case of a successful …
confidential data or threatening the availability of the infrastructure. In case of a successful …
Towards GDPR-compliant data processing in modern SIEM systems
The introduction of the General Data Protection Regulation (GDPR) in Europe raises a
whole series of issues and implications on the handling of corporate data. We consider the …
whole series of issues and implications on the handling of corporate data. We consider the …
A security information and event management pattern
M Vielberth, G Pernul - 2018 - epub.uni-regensburg.de
In order to achieve a high level of cyber security awareness most mid to large sized
companies use Security Information and Event Management (SIEM) embedded into a …
companies use Security Information and Event Management (SIEM) embedded into a …
[HTML][HTML] Implementing and evaluating a GDPR-compliant open-source SIEM solution
Abstract Security Information and Event Management (SIEM) solutions collect events from
the IT infrastructure and concentrate information from the various components in a single …
the IT infrastructure and concentrate information from the various components in a single …
[PDF][PDF] Smart SIEM: From big data logs and events to smart data alerts
Cyber defense has become an increasingly recurrent and even a mandatory requirement for
any type of organization that holds an Information System. In this context, a SIEM is the most …
any type of organization that holds an Information System. In this context, a SIEM is the most …
Effectiveness of Security Incident Event Management (SIEM) System for Cyber Security Situation Awareness.
BS Fakiha - Indian Journal of Forensic Medicine & …, 2020 - search.ebscohost.com
Cyber-attacks have always targeted information communication technology systems of
various organizations. Intruders and hackers have within their reach, very powerful tools …
various organizations. Intruders and hackers have within their reach, very powerful tools …
Characterizing the limitations of forensic event reconstruction based on log files
Many forensic investigations include the analysis of log files. In a scenario of a single
GNU/Linux server running Apache and Wordpress, we study which types of events can be …
GNU/Linux server running Apache and Wordpress, we study which types of events can be …
Improving digital forensics and incident analysis in production environments by using virtual machine introspection
B Taubmann - 2020 - opus4.kobv.de
Main memory forensics and its special form, virtual machine introspection (VMI), are
powerful tools for digital forensics and can be used to improve the security of computer …
powerful tools for digital forensics and can be used to improve the security of computer …
Efficient fingerprint matching for forensic event reconstruction
T Latzo - Digital Forensics and Cyber Crime: 11th EAI …, 2021 - Springer
Forensic investigations usually utilize log files to reconstruct previous events on computing
systems. Using standard log files as well as traces of system calls, we analyze what traces …
systems. Using standard log files as well as traces of system calls, we analyze what traces …