Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Security information and event management
Known as:
SIEM
In the field of computer security, security information and event management (SIEM) software products and services combine security information…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Apache Hadoop
Big data
Computer data storage
Computer security
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A passive GHz frequency-division multiplexer/demultiplexer based on anisotropic magnon transport in magnetic nanosheets
F. Heussner
,
G. Talmelli
,
+9 authors
P. Pirro
2019
Corpus ID: 139104600
F. Heussner, G. Talmelli, M. Geilen, B. Heinz, T. Brächer, T. Meyera, F. Ciubotaru, C. Adelmann, K. Yamamoto, A. A. Serga, B…
Expand
2018
2018
OMMA: open architecture for Operator-guided Monitoring of Multi-step Attacks
Julio Navarro
,
V. Legrand
,
A. Deruyver
,
P. Parrend
EURASIP Journal on Information Security
2018
Corpus ID: 21689378
Current attacks are complex and stealthy. The recent WannaCry malware campaign demonstrates that this is true not only for…
Expand
2017
2017
SIEM (SECURITY INFORMATION AND EVENT MANAGEMENT SOLUTIONS) IMPLEMENTATIONS IN PRIVATE OR PUBLIC CLOUDS
Vlad-Mihai Cotenescu
2017
Corpus ID: 116784435
The underlying principle of a SIEM system is that relevant data about an enterprise’s security is produced in multiple locations…
Expand
Review
2017
Review
2017
Single Step Joint: overview of European standardized approaches and experimentations
M. Verbist
,
J. Branco
,
E. Poletti
,
T. Descamps
,
P. Lourenço
2017
Corpus ID: 88504949
In the field of Built Heritage Restoration, engineers have to work with old structures made of poorly preserved timber elements…
Expand
2015
2015
Security Information and Event Management Management
Eva Kostrecová
,
H. Bínová
2015
Corpus ID: 110692517
The importance of IT security grows year by year. Cyber-attacks are getting more sophisticated, less detectable and our only…
Expand
Review
2013
Review
2013
Security information and event management tools and insider threat detection
Christopher J. Callahan
2013
Corpus ID: 108984297
Abstract : Malicious insider activities on military networks can pose a threat to military operations. Early identification of…
Expand
Review
2013
Review
2013
Data Mining Approach in Security Information and Event Management
A. Zope
,
A. Vidhate
,
N. Harale
2013
Corpus ID: 1315256
—This paper gives an overview of data mining field & security information event management system. We will see how various data…
Expand
2012
2012
A Trusted Information Agent for Security Information and Event Management
L. Coppolino
,
Michael Jäger
,
N. Kuntze
,
R. Rieke
International Conference on Systems
2012
Corpus ID: 54716938
This paper addresses security information man- agement in untrusted environments. A security information and event management…
Expand
Review
2012
Review
2012
Model-Based Security Event Management
J. Schütte
,
R. Rieke
,
Timo Winkelvos
Mathematical Methods, Models, and Architectures…
2012
Corpus ID: 10966889
With the growing size and complexity of current ICT infrastructures, it becomes increasingly challenging to gain an overview of…
Expand
1998
1998
Analytical determination of nicotine in tobacco by supercritical fluid chromatography–ion mobility detection
Ching Wu
,
W. Siems
,
H. Hill
,
R. Hannan
1998
Corpus ID: 28079091
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE