A literature review and existing challenges on software logging practices: From the creation to the analysis of software logs

MA Batoun, M Sayagh, R Aghili, A Ouni, H Li - Empirical Software …, 2024 - Springer
Software logging is the practice of recording different events and activities that occur within a
software system, which are useful for different activities such as failure prediction and …

[HTML][HTML] A data anonymization methodology for security operations centers: Balancing data protection and security in industrial systems

G Longo, F Lupia, A Merlo, F Pagano, E Russo - Information Sciences, 2025 - Elsevier
In an era where industrial Security Operations Centers (SOCs) are paramount to enabling
cybersecurity, they can unintentionally become enablers of intellectual property theft through …

Probing the past to guide the future IT regulation research: Topic modeling and co-word analysis of SOX-IS research

G Mangalaraj, A Singh, A Taneja - Information Systems …, 2023 - Taylor & Francis
Information technology's ubiquitous role has led to growing calls for regulations. Sparse
regulation in IT has led to a lack of holistic understanding of their impact on the IT field …

[HTML][HTML] Implementing and evaluating a GDPR-compliant open-source SIEM solution

AP Vazão, L Santos, RLC Costa, C Rabadão - Journal of Information …, 2023 - Elsevier
Abstract Security Information and Event Management (SIEM) solutions collect events from
the IT infrastructure and concentrate information from the various components in a single …

Log pseudonymization: Privacy maintenance in practice

A Varanda, L Santos, RLC Costa, A Oliveira… - Journal of Information …, 2021 - Elsevier
Mobile phones, social media, and Internet of Things (IoT) devices are examples of day-to-
day technologies that collect large amounts of data, including people's location, habits, and …

DBD-Guardian and Privacy-Aware Near Real-Time Cybersecurity Analytics

J Frade, L Santos, RLC Costa - IEEE Access, 2024 - ieeexplore.ieee.org
Big Data Cybersecurity Analytics (BDCA) is a helpful tool for cybersecurity maintenance that
may support the identification of potential threats. Data preparation for traditional BDCA …

[การอ้างอิง][C] Sistemas de deteção de intrusão