Systematic review of SIEM technology: SIEM-SC birth

JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …

[PDF][PDF] Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review

AD Khaleefah, HM Al-Mashhadi - Iraqi Journal of Science, 2024 - iasj.net
As a result of the emergence of new business paradigms and the development of the digital
economy, the interaction between operations, services, things, and software across …

Product-service system toward circularity: hierarchical framework in Indonesia's home appliance manufacturing industry under uncertainties

ML Tseng, RY Sujanto, V Ardaniah, TD Bui… - Annals of Operations …, 2023 - Springer
This study contributes to developing the hierarchical framework of product-service system
toward circularity under uncertainties of the home appliance industry in Indonesia. Product …

Boosting holistic cybersecurity awareness with outsourced wide-scope CyberSOC: A generalization from a spanish public organization study

M Domínguez-Dorado, FJ Rodríguez-Pérez… - Information, 2023 - mdpi.com
Public sector organizations are facing an escalating challenge with the increasing volume
and complexity of cyberattacks, which disrupt essential public services and jeopardize …

[HTML][HTML] Adaptive monitoring, detection, and response for agile digital service chains

M Repetto - Computers & Security, 2023 - Elsevier
Modern business is increasingly adopting fully-digital workflows composed of
complementary services (in terms of infrastructures, software, networks, data and devices) …

A neutrosophic framework for evaluating security measures in information systems

JJ Santander Moreno, JA Ortega Matoma… - Journal of Fuzzy …, 2024 - journal-fea.com
This study introduces a neutrosophic framework combined with the multi-attribute decision-
making methods TODIM and PROMETHEE to evaluate security measures in information …

Conscious fog and electricity computing performance: Renewable energy case study

G Maulani, N Wiwin, V Elmanda… - … on Science and …, 2022 - ieeexplore.ieee.org
Fog computing is a highly advantageous computing paradigm for delay, duration, and
application-sensitive areas. The features mentioned above make fog computing highly …

bccstego: A framework for investigating network covert channels

M Repetto, L Caviglione, M Zuppelli - Proceedings of the 16th …, 2021 - dl.acm.org
Modern malware increasingly exploits information hiding to remain undetected while
attacking. To this aim, network covert channels, ie, hidden communication paths established …

An autonomous cybersecurity framework for next-generation digital service chains

M Repetto, D Striccoli, G Piro, A Carrega… - Journal of Network and …, 2021 - Springer
Today, the digital economy is pushing new business models, based on the creation of value
chains for data processing, through the interconnection of processes, products, services …

[PDF][PDF] A discussion on ethical cybersecurity issues in digital service chains

F Tronnier, S Pape, S Löbner… - Cybersecurity of digital …, 2022 - library.oapen.org
Enabling cybersecurity and protecting personal data are crucial challenges in the
development and provision of digital service chains. Data and information are the key …