Systematic review of SIEM technology: SIEM-SC birth
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …
System Information and Event Management (SIEM) technology and what may possibly be …
SieveQ: A Layered BFT Protection System for Critical Services
Firewalls play a crucial role in assuring the security of today's critical infrastructures, forming
a first line of defense by being placed strategically at the front-end of the networks …
a first line of defense by being placed strategically at the front-end of the networks …
Identification of critical situations via event processing and event trust analysis
ML Itria, M Kocsis-Magyar, A Ceccarelli… - … and Information Systems, 2017 - Springer
In crisis management systems, situational awareness is usually at the basis of guiding the
intervention process, and it is required to rapidly process data acquired from information …
intervention process, and it is required to rapidly process data acquired from information …
A high-level domain-specific language for SIEM (design, development and formal verification)
Organizations deploy security information and event management (SIEM) systems for
centralized management of security events. The real-time security monitoring capability of …
centralized management of security events. The real-time security monitoring capability of …
Cloud DDoS detection and defense system using complex event processing
Distributed Denial of Service attacks is the predominant targeted cyber-attack on the cloud
infrastructure which has now evolved as the persistent and more sophisticated attack. DDoS …
infrastructure which has now evolved as the persistent and more sophisticated attack. DDoS …
A multi-layer anomaly detector for dynamic service-based systems
Revealing anomalies to support error detection in complex systems is a promising approach
when traditional detection mechanisms (eg, based on event logs, probes and heartbeats) …
when traditional detection mechanisms (eg, based on event logs, probes and heartbeats) …
Big data complex event processing for internet of things provenance: benefits for audit, forensics, and safety
M Underwood - Cyber‐Assurance for the Internet of Things, 2016 - Wiley Online Library
Abstract Some Internet of Things (IoT) subsystems will be far less robust than others.
Systems that rely on these sensors require considerable knowledge about the sensors, their …
Systems that rely on these sensors require considerable knowledge about the sensors, their …
Event-driven principles and complex event processing for self-adaptive network analysis and surveillance systems
R Gad - 2015 - rodin.uca.es
Event-driven approaches and Complex Event Processing (CEP) have the potential to aid in
tackling the complex requirements and challenges of monitoring contemporary computer …
tackling the complex requirements and challenges of monitoring contemporary computer …
Gestión de la Seguridad de la Información de la Infraestructura de Red Datos de la Minera Shahuindo Mediante Ossim y Cobit
TL Luján Flores, VE Huancas Samillán - 2023 - repositorio.unprg.edu.pe
Uno de los problemas que hoy en día tienen las empresas que soportan sus procesos
sobre tecnologías de la información y las comunicaciones es la gestión que realizan sobre …
sobre tecnologías de la información y las comunicaciones es la gestión que realizan sobre …
[PDF][PDF] Distributed log analysis for scenario-based detection of multi-step attacks and generation of near-optimal defense recommendations
K Kaynar - 2017 - depositonce.tu-berlin.de
Detecting related, ongoing actions of attackers is significant for providing a complete
situational assessment of security and determining the most effective reactive defense …
situational assessment of security and determining the most effective reactive defense …