Articles by keywords "Security Monitoring"
A method of responding to targeted attacks based on the mapping of information security events using indication signatures
- Year: 2023
- Issue: 4
- 15
- 595
- Pages: 48-60
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 798
- Pages: 18-31
A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security
- Year: 2025
- Issue: 1
- 7
- 898
- Pages: 121-131