Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,322,738 papers from all fields of science
Search
Sign In
Create Free Account
Security information and event management
Known as:
SIEM
In the field of computer security, security information and event management (SIEM) software products and services combine security information…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Apache Hadoop
Big data
Computer data storage
Computer security
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A passive GHz frequency-division multiplexer/demultiplexer based on anisotropic magnon transport in magnetic nanosheets
F. Heussner
,
G. Talmelli
,
+9 authors
P. Pirro
2019
Corpus ID: 139104600
F. Heussner, G. Talmelli, M. Geilen, B. Heinz, T. Brächer, T. Meyera, F. Ciubotaru, C. Adelmann, K. Yamamoto, A. A. Serga, B…
Expand
2018
2018
Bayesian Uncertainty Quantification of Physical Models in Thermal-Hydraulics System Codes
Damar Wicaksono
2018
Corpus ID: 196022368
Nuclear thermal-hydraulics (TH) system codes use several parametrized physical or empirical models to describe complex two-phase…
Expand
2017
2017
SIEM (SECURITY INFORMATION AND EVENT MANAGEMENT SOLUTIONS) IMPLEMENTATIONS IN PRIVATE OR PUBLIC CLOUDS
Vlad-Mihai Cotenescu
2017
Corpus ID: 116784435
The underlying principle of a SIEM system is that relevant data about an enterprise’s security is produced in multiple locations…
Expand
Review
2016
Review
2016
A SURVEY ON LOG CORELATION IN SECURITY INFORMATION AND EVENT MANAGEMENT WITH HADOOP
Anand R Mehta
,
M. Abhishek
2016
Corpus ID: 169936976
In a today’s era, technology gives more and more benefits in the public sector as well as the threats and impact of the threats…
Expand
2015
2015
Security Information and Event Management Management
Eva Kostrecová
,
H. Bínová
2015
Corpus ID: 110692517
The importance of IT security grows year by year. Cyber-attacks are getting more sophisticated, less detectable and our only…
Expand
2015
2015
Induksi Pembungaan Jeruk Siem Kintamani (Citrus reticulata B.) dengan Paclobutrazol dan Zat Pemecah Dormansi KNO3
N. Darmayanti
2015
Corpus ID: 88737196
NI WAYAN SURYA DARMAYANTI. Flowering Induction Siem Kintamani Citrus (Citrus reticulata B.) with Paclobutrazol and Dormancy…
Expand
2014
2014
Security of electronic health records in a resource limited setting: The case of smart-care electronic health record in Zambia
Keith Mweebo
2014
Corpus ID: 8208986
This paper presents a case study of security issues related to the operationalization of smart-care, an electronic medical record…
Expand
2012
2012
TOWARDS AN INTELLIGENT SECURITY EVENT INFORMATION MANAGEMENT SYSTEM
Esther Palomar
,
A. Ribagorda
,
Yan Zhang
2012
Corpus ID: 51781577
The strategy of combining artificial intelligence (AI) and self–adaptation to optimize different types of computing services is…
Expand
Review
2009
Review
2009
Early Warning and Intrusion Detection based on Combined AI Methods
S. Edelkamp
,
Carsten Elfers
,
M. Horstmann
,
Marcus-Sebastian Schröder
,
K. Sohr
,
Thomas Wagner
2009
Corpus ID: 12613894
In this paper we survey the architecture and AI aspects in our project on early warningand intrusion detection based on combined…
Expand
Review
2002
Review
2002
A Preliminary Survey of the Fishes of Lake Tonle Sap Near Siem Reap, Cambodia
H. Motomura
,
S. Tsukawaki
,
T. Kamiya
2002
Corpus ID: 134217369
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE