The Guidelines to Adopt an Applicable SIEM Solution

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

In Support of EHP’s Proposal to Adopt the ARRIVE Guidelines

We strongly support EHP's proposal encouraging authors who perform animal studies to adhere to the ARRIVE guidelines and Schroeder 2013), a 20‑item checklist for the reporting of key elements necessary to describe a study compre hensively and transparently (Kilkenny et al. 2010). In the clinical sphere, systematic review methods have been at the forefront of evidence‑based research for the past...

متن کامل

ترجمه و تحقیق کتاب an introduction to the history of mysticism

پایان نامه ی ارائه شده ترجمه ی کتاب «an introduction to the history of mysticism» نوشته ی مارگارت اسمیت که وی پژوهشگر، خاورشناس و محقق برجسته ی تصوف و عرفان می باشد. موضوع اساسی و مهم این کتاب عرفان در ادیان مختلف است. نویسنده در ابتدا این کلمه را ریشه یابی کرده و سپس تعریفی از آن ارائه داده و آن را در ادیان مختلف مورد بحث قرار داده است و در هر فصل کتاب به معرفی عرفای آن دین یا عصر خاصی پرداخته...

15 صفحه اول

To Adopt or Not to Adopt - That is the Question

The area of adoption and diffusion has had a strong pro-innovation bias (Brancheau and Wetherbe 1990; Parthasarathy and Bhattacherjee 1998; Ram 1987; Venkatesh and Brown 2001). This bias has resulted in somewhat of a neglect of the area of non-adoption. Existing theories including TAM (Davis 1989) and the innovation diffusion theory (Rogers 1983) provide critical insights into technology usage....

متن کامل

Enhancing SIEM Technology to Protect Critical Infrastructures

Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory Control And Data Acquisition (SCADA) systems are increasing and becoming more sophisticated. Typically, SCADA has been designed without having security in mind, which is indeed approached by reusing solutions to protect solely Information Technology (IT) based infrastructures, such as the Security Informati...

متن کامل

An Ontology-Based Model for SIEM Environments

The management of security events, from the analysis of attacks and risk to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, network and system devices are designed to be heterogeneous, with different characteristics and functionalities that increase the difficulty of these tasks. This paper introduces an ontology...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security

سال: 2020

ISSN: 2153-1234,2153-1242

DOI: 10.4236/jis.2020.111003