Search Results - "Security monitoring"
-
1
Authors:
Source: Автоматизация технологических и бизнес-процессов, Vol 17, Iss 1, Pp 17-24 (2025)
Subject Terms: digital environment, cybersecurity, information security, automatic control, social engineering, cyber defense, security monitoring, business process automation, T59.5, Automation, open access repositories, business process management automation tools, information and communication technologies (ict), ddos attacks
-
2
Authors: et al.
Source: IEEE Access, Vol 13, Pp 85307-85329 (2025)
Subject Terms: Cyber security monitoring in maritime, FOS: Computer and information sciences, Computer Science - Cryptography and Security, literature review, maritime, Electrical engineering. Electronics. Nuclear engineering, cyber security monitoring, Cryptography and Security (cs.CR), maritime cyber security, TK1-9971
-
3
Source: Science-based technologies; Vol. 67 No. 3 (2025); 317-324
Наукоемкие технологии; Том 67 № 3 (2025); 317-324
Наукоємні технології; Том 67 № 3 (2025); 317-324Subject Terms: network traffic analysis, cybersecurity, iIntrusion detection system, NIDS, threat detection, HIDS, Ids, IDS, security monitoring, система виявлення вторгнень, моніторинг безпеки, виявлення загроз, кібербезпека, аналіз мережевого трафіку
File Description: application/pdf
-
4
Authors: et al.
Source: World Journal of Advanced Research and Reviews. 25:2058-2066
Subject Terms: Deep Learning, Surveillance, Weapon Detection, Object Detection, Real-Time Processing, Security Monitoring, YOLO
-
5
Authors: et al.
Source: IEEE Access, Vol 13, Pp 76684-76702 (2025)
-
6
Authors: et al.
Contributors: et al.
Source: idUS. Depósito de Investigación de la Universidad de Sevilla
Universidad de Sevilla (US)
Digibug. Repositorio Institucional de la Universidad de Granada
Universidad de Granada (UGR)
Journal of Universal Computer Science, Vol 30, Iss 9, Pp 1184-1204 (2024)
JUCS-Journal of Universal Computer Science 30(9): 1184-1204Subject Terms: alert correlation, Cyberattacks models, Intrusion Detection S, network security monitoring, Electronic computers. Computer science, cyberattacks models, QA75.5-76.95, Network security monitoring, Intrusion Detection Systems, Alert correlation, Mitre ATT&CK attack models
File Description: application/pdf; text/html
-
7
Authors:
Source: Proceedings of the 19th International Conference on Availability, Reliability and Security. :1-6
Subject Terms: Machine Learning, 102019 Machine Learning, Smart Meter Networks, 102034 Cyber-Physical Systems, 102034 Cyber-physical systems, Anomaly Detection, Security Monitoring, SDG 7 - Affordable and Clean Energy, SDG 7 – Bezahlbare und saubere Energie, 102016 IT-Sicherheit, 102019 Machine learning, 102016 IT security
File Description: application/pdf
-
8
Authors: et al.
Contributors: et al.
Source: European Conference on Cyber Warfare and Security. 23:780-787
Subject Terms: behavioral analysis, threat intelligence, machine learning, Engineering, koneoppiminen, Tekniikka, turvallisuus, tietoturva, kyberturvallisuus, security monitoring, anomaly detection, SIEM and splunk monitoring, Secure Communications Engineering and Signal Processing
File Description: application/pdf; fulltext
Access URL: http://urn.fi/URN:NBN:fi:jyu-202406275040
-
9
Authors: et al.
Source: Discover Internet of Things, Vol 5, Iss 1, Pp 1-15 (2025)
Subject Terms: Internet of things, Healthcare, Security monitoring, Authentication, Data security, Encryption, Computer engineering. Computer hardware, TK7885-7895, Computer software, QA76.75-76.765
File Description: electronic resource
Relation: https://doaj.org/toc/2730-7239
-
10
Authors: et al.
Contributors: et al.
Source: RiuNet. Repositorio Institucional de la Universitat Politécnica de Valéncia
Universitat Politècnica de València (UPV)
idUS. Depósito de Investigación de la Universidad de Sevilla
Universidad de Sevilla (US)
Revista Iberoamericana de Automática e Informática Industrial RIAI, Vol 22, Iss 2, Pp 112-119 (2024)Subject Terms: Data-based control, control basado en datos, Control engineering systems. Automatic machinery (General), Constraint and security monitoring and control, métodos no paramétricos, monitoreo y control de restricciones y seguridad, aprendizaje para el control, Monitoreo y control de ´ restricciones y seguridad, Aprendizaje para el control, Smart grids, Monitoreo y control de restricciones y seguridad, Control basado en datos, control de recursos de energía renovable, Learning for control, Control of renewable energy resources, TJ212-225, redes eléctricas inteligentes, Nonparametric methods, Métodos no paramétricos, Redes eléctricas inteligentes, Redes el ´ ectricas inteligentes, Control de recursos de energía renovable, Metodos no param ´ etricos, Control de recursos de energ´ıa renovable
File Description: application/pdf
-
11
Authors: ATIF, RAZA
Subject Terms: Network Downtime Prevention, Automated Network Troubleshooting, AI for Cybersecurity, Intelligent Network Monitoring, Compliance Automation, AI-driven Compliance, Artificial Intelligence (AI), Network Threat Detection, AIOps (AI for IT Operations), Network Management, Real-Time Security Monitoring, Anomaly Detection, AIOps Platforms, Root Cause Analysis, Self-Healing Networks
-
12
Authors: Semen M. Levin
Source: Известия Томского политехнического университета: Промышленная кибернетика, Vol 2, Iss 2, Pp 1-16 (2024)
Subject Terms: Computer engineering. Computer hardware, cloud technologies, cyber threats, security monitoring, TK7885-7895, QA76.75-76.765, access management, artificial intelligence in security, blockchain in data protection, Q300-390, Computer software, data encryption, data security, adaptive security systems, Cybernetics, compliance with regulatory requirements
-
13
Authors: et al.
Source: IEEE Access, Vol 13, Pp 180710-180724 (2025)
Subject Terms: Digital twin, condition monitoring, cyber security monitoring, operational technology, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
14
Authors:
Contributors:
Subject Terms: Network Infrastructure, Graph Visualization, Asset Management, Security Monitoring, Human-Computer Interaction, SDG 9 - Industry, innovation and infrastructure, Domínio/Área Científica::Ciências Naturais::Ciências da Computação e da Informação
File Description: application/pdf
Availability: http://hdl.handle.net/10362/179665
-
15
Source: Eastern-European Journal of Enterprise Technologies; Vol. 1 No. 9 (133) (2025): Information and controlling system; 6-23
Eastern-European Journal of Enterprise Technologies; Том 1 № 9 (133) (2025): Інформаційно-керуючі системи; 6-23Subject Terms: інтернет речей, моніторинг безпеки, контроль доступу, access control, video surveillance, архітектура системи, system architecture, відеоспостереження, internet of things, security monitoring
File Description: application/pdf
-
16
Authors: et al.
Source: Energy Informatics, Vol 8, Iss 1, Pp 1-17 (2025)
-
17
-
18
Authors:
Source: Results in Optics, Vol 19, Iss , Pp 100821- (2025)
Subject Terms: Passive Infrared (PIR) Sensors, Fresnel Lens, Security Monitoring Systems, Non-Coaxial Design, Optical Simulation, Optics. Light, QC350-467
File Description: electronic resource
-
19
Authors: et al.
Contributors: et al.
Source: Hui, H, McLaughlin, K, Siddiqui, F, Sezer, S, Yengec Tasdemir, S & Sonigara, B 2023, A runtime security monitoring architecture for embedded hypervisors. in J Becker, A Marshall, T Harbaum, A Ganguly, F Siddiqui & K McLaughlin (eds), Proceedings of the IEEE 36th International System-on-Chip Conference, SOCC 2023. IEEE International SOC Conference: Proceedings, Institute of Electrical and Electronics Engineers Inc., 36th IEEE International System-on-Chip Conference 2023, Santa Clara, California, United States, 05/09/2023. https://doi.org/10.1109/SOCC58585.2023.10256735
2023 IEEE 36th International System-on-Chip Conference (SOCC)Subject Terms: Risk, 0211 other engineering and technologies, 02 engineering and technology, Runtime Monitoring, name=SDG 9 - Industry, Innovation, and Infrastructure, Hypervisor, name=SDG 9 - Industry, name=SDG 8 - Decent Work and Economic Growth, name=General Computer Science, name=Safety, 0202 electrical engineering, electronic engineering, information engineering, name=General Engineering, name=SDG 17 - Partnerships for the Goals, Innovation, Runtime Security Monitoring, name=Computer Networks and Communications, name=Safety, Risk, Reliability and Quality, name=SDG 11 - Sustainable Cities and Communities, Reliability and Quality, and Infrastructure, Security, Embedded Systems
File Description: application/pdf
-
20
Authors: et al.
Contributors: et al.
Source: 2022 IEEE International Conference on Big Data (Big Data). :2960-2969
Subject Terms: big data, 0202 electrical engineering, electronic engineering, information engineering, Cyber security big data security monitoring, [INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB], 02 engineering and technology, Cyber security, security monitoring
File Description: application/pdf
Nájsť tento článok vo Web of Science
Full Text Finder