| PDF - Accepted Version frei zugänglich ab 15.7.25 (363kB) |
- URN to cite this document:
- urn:nbn:de:bvb:355-epub-586583
- DOI to cite this document:
- 10.5283/epub.58658
Abstract
Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event ...

Owner only: item control page

Download Statistics