The Guidelines to Adopt an Applicable SIEM Solution
نویسندگان
چکیده
منابع مشابه
In Support of EHP’s Proposal to Adopt the ARRIVE Guidelines
We strongly support EHP's proposal encouraging authors who perform animal studies to adhere to the ARRIVE guidelines and Schroeder 2013), a 20‑item checklist for the reporting of key elements necessary to describe a study compre hensively and transparently (Kilkenny et al. 2010). In the clinical sphere, systematic review methods have been at the forefront of evidence‑based research for the past...
متن کاملترجمه و تحقیق کتاب an introduction to the history of mysticism
پایان نامه ی ارائه شده ترجمه ی کتاب «an introduction to the history of mysticism» نوشته ی مارگارت اسمیت که وی پژوهشگر، خاورشناس و محقق برجسته ی تصوف و عرفان می باشد. موضوع اساسی و مهم این کتاب عرفان در ادیان مختلف است. نویسنده در ابتدا این کلمه را ریشه یابی کرده و سپس تعریفی از آن ارائه داده و آن را در ادیان مختلف مورد بحث قرار داده است و در هر فصل کتاب به معرفی عرفای آن دین یا عصر خاصی پرداخته...
15 صفحه اولTo Adopt or Not to Adopt - That is the Question
The area of adoption and diffusion has had a strong pro-innovation bias (Brancheau and Wetherbe 1990; Parthasarathy and Bhattacherjee 1998; Ram 1987; Venkatesh and Brown 2001). This bias has resulted in somewhat of a neglect of the area of non-adoption. Existing theories including TAM (Davis 1989) and the innovation diffusion theory (Rogers 1983) provide critical insights into technology usage....
متن کاملEnhancing SIEM Technology to Protect Critical Infrastructures
Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory Control And Data Acquisition (SCADA) systems are increasing and becoming more sophisticated. Typically, SCADA has been designed without having security in mind, which is indeed approached by reusing solutions to protect solely Information Technology (IT) based infrastructures, such as the Security Informati...
متن کاملAn Ontology-Based Model for SIEM Environments
The management of security events, from the analysis of attacks and risk to the selection of appropriate countermeasures, has become a major concern for security analysts and IT administrators. Furthermore, network and system devices are designed to be heterogeneous, with different characteristics and functionalities that increase the difficulty of these tasks. This paper introduces an ontology...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Security
سال: 2020
ISSN: 2153-1234,2153-1242
DOI: 10.4236/jis.2020.111003