Journal articles on the topic 'Chronicle SIEM: A Security Information and Event Management system used to the detection and analysis of security events'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 28 journal articles for your research on the topic 'Chronicle SIEM: A Security Information and Event Management system used to the detection and analysis of security events.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Venkat, Sumanth Guduru. "Integrating Salesforce with Cybersecurity Tools for Enhanced Data Protection (Chronicle SIEM)." European Journal of Advances in Engineering and Technology 11, no. 8 (2024): 27–31. https://doi.org/10.5281/zenodo.13789978.
Full textBezas, Konstantinos, and Foteini Filippidou. "Comparative Analysis of Open Source Security Information & Event Management Systems (SIEMs)." Indonesian Journal of Computer Science 12, no. 2 (2023): 443–68. http://dx.doi.org/10.33022/ijcs.v12i2.3182.
Full textGnatyuk, Sergiy, Rat Berdibayev, Viktoriia Sydorenko, Oksana Zhyharevych, and Tetiana Smirnova. "SYSTEM FOR CYBER SECURITY EVENTS CORRELATION AND INCIDENT MANAGEMENT IN CRITICAL INFRASTRUCTURE OBJECTS." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 176–96. http://dx.doi.org/10.28925/2663-4023.2023.19.176196.
Full textIssenoro, Herlina Trisnawati, Sakius Octavianus Tarigan, Novianti Madhona Faizah, and Veranita. "Perancangan dan Pengembangan Aplikasi Deteksi Anomali pada Jaringan Internet Gedung Disaster Recovery Center Badan Diklat Kejaksaan RI dengan Implementasi Sistem Manajemen Informasi dan Keamanan (SIEM) Berbasis Web." Jurnal Ilmu Komputer dan Teknologi Informasi 2, no. 1 (2025): 12–21. https://doi.org/10.35870/jikti.v2i1.1341.
Full textMohammed, Mustafa Khan. "Proactive Cyber Defense: Conducting Real-Time Monitoring and Analysis of Security Events Using SIEM Tools to Detect and Respond to Potential Security Incidents." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 12, no. 3 (2024): 1–11. https://doi.org/10.5281/zenodo.13959577.
Full textKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.
Full textBOLILYI, V. O., L. P. SUKHOVIRSKA та O. M. LUNHOL. "ОПЕРАЦІЙНИЙ ЦЕНТР БЕЗПЕКИ ЯК ПОСЛУГА НА ОСНОВІ SIEM". Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 1, № 2 (2021): 177–86. http://dx.doi.org/10.31494/2412-9208-2021-1-2-177-186.
Full textSuchismita, Chatterjee. "Using SIEM and SOAR for Real-Time Cybersecurity Operations in Oil and Gas." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 2 (2020): 1–11. https://doi.org/10.5281/zenodo.14598693.
Full textHendra Setiawan and Wiwin Sulistyo. "SIEM (Security Information Event Management) Model for Malware Attack Detection Using Suricata and Evebox." International Journal of Engineering Technology and Natural Sciences 5, no. 2 (2023): 138–47. http://dx.doi.org/10.46923/ijets.v5i2.241.
Full textadmin, admin. "AlertFusion-OptiNet: An Advanced SIEM Alert Management System for IoT Environments using CMRO and AlertQ-Net." Fusion: Practice and Applications 18, no. 2 (2025): 01–23. https://doi.org/10.54216/fpa.180201.
Full textDjamalyanto, Meidi, Lilik Widyawati, Husain Husain, and I. Putu Hariyadi. "IMPLEMENTASI SECURITY INFORMATION AND EVENT MANAGEMENT UNTUK MENCEGAH SERANGAN DEFACE PADA SERVER TERINTEGRASI TELEGRAM." Melek IT : Information Technology Journal 11, no. 1 (2025): 31–42. https://doi.org/10.30742/melekitjournal.v11i1.398.
Full textOnishchenko, Volodymyr, Oleksandr Puchkov, and Ihor Subach. "Investigation of associative rule search method for detection of cyber incidents in information management systems and security events using CICIDS2018 test data set." Collection "Information Technology and Security" 12, no. 1 (2024): 91–101. http://dx.doi.org/10.20535/2411-1031.2024.12.1.306275.
Full textMiloslavskaya, Natalia. "Designing blockchain-based SIEM 3.0 system." Information & Computer Security 26, no. 4 (2018): 491–512. http://dx.doi.org/10.1108/ics-10-2017-0075.
Full textYakoviv, Ihor. "Model of four cyber attack information environments." Collection "Information Technology and Security" 11, no. 2 (2023): 175–92. http://dx.doi.org/10.20535/2411-1031.2023.11.2.293768.
Full textSitnik, Viktoria A., Denis D. Vishnyakov, and Maria V. Shcherba. "Organization of monitoring of network intrusions on the basis of freely distributable software." Digital technology security, no. 2 (June 30, 2022): 63–73. http://dx.doi.org/10.17212/2782-2230-2022-2-63-73.
Full textFournaris, Apostolos P., Charis Dimopoulos, Konstantinos Lampropoulos, and Odysseas Koufopavlou. "Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices." Sensors 20, no. 11 (2020): 3092. http://dx.doi.org/10.3390/s20113092.
Full textYudhianto, Ichsan. "Simple, Fast, and Accurate Cybercrime Detection on E-Government with Elastic Stack SIEM." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 9, no. 2 (2023): 263. http://dx.doi.org/10.26418/jp.v9i2.64213.
Full textBarletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera, and Manuel Ángel Serrano Martín. "V-SOC4AS: A Vehicle-SOC for Improving Automotive Security." Algorithms 16, no. 2 (2023): 112. http://dx.doi.org/10.3390/a16020112.
Full textUche Ojika, Favour, Wilfred Oseremen Owobu, Olumese Anthony Abieba, Oluwafunmilayo Janet Esan, Bright Chibunna Ubamadu, and Andrew Ifesinachi Daraojimba. "The Role of AI in Cybersecurity: A Cross-Industry Model for Integrating Machine Learning and Data Analysis for Improved Threat Detection." International Journal of Advanced Multidisciplinary Research and Studies 4, no. 6 (2024): 1427–48. https://doi.org/10.62225/2583049x.2024.4.6.4045.
Full textTariq, Aamna, Jawad Manzoor, Muhammad Ammar Aziz, Zain Ul Abideen Tariq, and Ammar Masood. "Open source SIEM solutions for an enterprise." Information & Computer Security, September 27, 2022. http://dx.doi.org/10.1108/ics-09-2021-0146.
Full textGürtürk, Uğur, and Zeynep Gürkaş Aydın. "An Incident Management System Design to Protect Critical Infrastructures from Cyber Attacks." Journal of Mathematical Sciences and Modelling, June 4, 2024, 60–74. http://dx.doi.org/10.33187/jmsm.1484997.
Full textApostolos, P. Fournaris, Dimopoulos Charis, Lampropoulos Konstantinos, and Koufopavlou Odysseas. "Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices." Sensors 20, no. 11 (2020). https://doi.org/10.3390/s20113092.
Full textSchölzel, Markus, Evren Eren, Kai-Oliver Detken, and Leonid Schwenke. "MONITORING ANDROID DEVICES BY USING EVENTS AND METADATA." International Journal of Computing, December 29, 2016, 248–58. http://dx.doi.org/10.47839/ijc.15.4.856.
Full textJoy, Francis. "Emerging Trends and Challenges in Cybersecurity: Keeping up with advancements in technology, addressing new threats like ransomware, and developing innovative solutions to enhance cybersecurity capabilities." March 30, 2024. https://doi.org/10.5281/zenodo.10897234.
Full textLipskiy, Nikolay, and James Tyson. "Advancing PH Emergency Preparedness Informatics to Support Emergency Responses." Online Journal of Public Health Informatics 9, no. 1 (2017). http://dx.doi.org/10.5210/ojphi.v9i1.7637.
Full textSrinivas, Koppu. "A Survey on Recent Trends in Human-Computer Interaction." September 28, 2012. https://doi.org/10.5121/ijbb.2012.2302.
Full textStalcup, Meg. "What If? Re-imagined Scenarios and the Re-Virtualisation of History." M/C Journal 18, no. 6 (2016). http://dx.doi.org/10.5204/mcj.1029.
Full textDe Boisboissel, G. "Արհեստական բանականություն. կիրառման նոր ձևերը և ազդեցությունը զորքերի մարտական կառավարման վրա / Artificial intelligence: new uses and impacts on military command and control". Հայկական բանակ / Armenian Army, 2024, 36–70. https://doi.org/10.61760/18290108-ehb24.2-36.
Full text