A principal component analysis of barriers to the implementation of blockchain technology in the South African built environment

OI Akinradewo, CO Aigbavboa, DJ Edwards… - Journal of Engineering …, 2022 - emerald.com
Purpose Blockchain technology is one of the emerging innovative technologies making
waves globally, and it has been adjudged to have the capability to transform businesses …

A secure and auditable logging infrastructure based on a permissioned blockchain

B Putz, F Menges, G Pernul - Computers & Security, 2019 - Elsevier
Abstract Information systems in organizations are regularly subject to cyber attacks targeting
confidential data or threatening the availability of the infrastructure. In case of a successful …

Towards GDPR-compliant data processing in modern SIEM systems

F Menges, T Latzo, M Vielberth, S Sobola, HC Pöhls… - Computers & …, 2021 - Elsevier
The introduction of the General Data Protection Regulation (GDPR) in Europe raises a
whole series of issues and implications on the handling of corporate data. We consider the …

A security information and event management pattern

M Vielberth, G Pernul - 2018 - epub.uni-regensburg.de
In order to achieve a high level of cyber security awareness most mid to large sized
companies use Security Information and Event Management (SIEM) embedded into a …

[HTML][HTML] Implementing and evaluating a GDPR-compliant open-source SIEM solution

AP Vazão, L Santos, RLC Costa, C Rabadão - Journal of Information …, 2023 - Elsevier
Abstract Security Information and Event Management (SIEM) solutions collect events from
the IT infrastructure and concentrate information from the various components in a single …

[PDF][PDF] Smart SIEM: From big data logs and events to smart data alerts

M El Arass, N Souissi - Int. J. Innov. Technol. Explor. Eng, 2019 - researchgate.net
Cyber defense has become an increasingly recurrent and even a mandatory requirement for
any type of organization that holds an Information System. In this context, a SIEM is the most …

Effectiveness of Security Incident Event Management (SIEM) System for Cyber Security Situation Awareness.

BS Fakiha - Indian Journal of Forensic Medicine & …, 2020 - search.ebscohost.com
Cyber-attacks have always targeted information communication technology systems of
various organizations. Intruders and hackers have within their reach, very powerful tools …

Characterizing the limitations of forensic event reconstruction based on log files

T Latzo, F Freiling - … Conference On Trust, Security And Privacy …, 2019 - ieeexplore.ieee.org
Many forensic investigations include the analysis of log files. In a scenario of a single
GNU/Linux server running Apache and Wordpress, we study which types of events can be …

Improving digital forensics and incident analysis in production environments by using virtual machine introspection

B Taubmann - 2020 - opus4.kobv.de
Main memory forensics and its special form, virtual machine introspection (VMI), are
powerful tools for digital forensics and can be used to improve the security of computer …

Efficient fingerprint matching for forensic event reconstruction

T Latzo - Digital Forensics and Cyber Crime: 11th EAI …, 2021 - Springer
Forensic investigations usually utilize log files to reconstruct previous events on computing
systems. Using standard log files as well as traces of system calls, we analyze what traces …