Coordinated and targeted cyber-attacks on Critical Infrastructures (CIs) and Supervisory Control And Data Acquisition (SCADA) systems are increasing and becoming more sophisticated. Typically, SCADA has been designed without having security in mind, which is indeed approached by reusing solutions to protect solely Information Technology (IT) based infrastructures, such as the Security Information and Events Management (SIEM) systems. According to the National Institute of Standards and Technology (NIST), these systems are often ineffective for CIs protection. In this paper we analyze limits of current SIEMs and propose a framework developed in the MASSIF Project to enhance services for data treatment. Particularly, the Generic Event Transla...
The technological leap of smart technologies has brought the conventional electrical grid in a new d...
In this paper, we present the approach we have taken in the INcreasing Security and Protection throu...
In this paper, we present the approach we have taken in the INcreasing Security and Protection throu...
Attacks on Critical Infrastructures are increasing and becoming more sophisticated. In addition to s...
In the last two years an increasing number of coordinated and targeted cyber-attacks, characterized ...
In recent years the monitoring and control devices in charge of supervising the critical processes o...
Critical Infrastructure Protection is one of the main challenges of last years. Security Information...
Critical Infrastructure Protection is one of the main challenges of last years. Security Information...
Security information and event management (SIEM) systems are increasingly used to cope with the secu...
Security information and event management (SIEM) systems are increasingly used to cope with the secu...
Security information and event management (SIEM) systems are increasingly used to cope with the secu...
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful too...
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful too...
Security Information and Event Management (SIEM) is a consolidated technology that relies on the cor...
This paper describes a next-generation security information and event management (SIEM) platform tha...
The technological leap of smart technologies has brought the conventional electrical grid in a new d...
In this paper, we present the approach we have taken in the INcreasing Security and Protection throu...
In this paper, we present the approach we have taken in the INcreasing Security and Protection throu...
Attacks on Critical Infrastructures are increasing and becoming more sophisticated. In addition to s...
In the last two years an increasing number of coordinated and targeted cyber-attacks, characterized ...
In recent years the monitoring and control devices in charge of supervising the critical processes o...
Critical Infrastructure Protection is one of the main challenges of last years. Security Information...
Critical Infrastructure Protection is one of the main challenges of last years. Security Information...
Security information and event management (SIEM) systems are increasingly used to cope with the secu...
Security information and event management (SIEM) systems are increasingly used to cope with the secu...
Security information and event management (SIEM) systems are increasingly used to cope with the secu...
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful too...
Security Information and Event Management (SIEM) systems have been widely deployed as a powerful too...
Security Information and Event Management (SIEM) is a consolidated technology that relies on the cor...
This paper describes a next-generation security information and event management (SIEM) platform tha...
The technological leap of smart technologies has brought the conventional electrical grid in a new d...
In this paper, we present the approach we have taken in the INcreasing Security and Protection throu...
In this paper, we present the approach we have taken in the INcreasing Security and Protection throu...