Articles with "security event" as a keyword



Photo from wikipedia

Visualization of security event logs across multiple networks and its application to a CSOC

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1317-2

Abstract: We introduce VisIDAC presented in Song at al (In: Nguyen, P.Q., Zhou, J. (eds.) Information Security—20th International Conference, ISC 2017, Security and Cryptology, vol. 10599. Springer International Publishing, 2017), which is a 3-D real-time visualization… read more here.

Keywords: security events; visualization security; security; security event ... See more keywords
Photo by pabloheimplatz from unsplash

Systematic Literature Review of Security Event Correlation Methods

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3168976

Abstract: Security event correlation approaches are necessary to detect and predict incremental threats such as multi-step or targeted attacks (advanced persistent threats) and other causal sequences of abnormal events. The use of security event correlation techniques… read more here.

Keywords: event; correlation methods; security event; correlation ... See more keywords
Photo from archive.org

Software for security event management: Development and utilization

Sign Up to like & get
recommendations!
Published in 2017 at "Bit Numerical Mathematics"

DOI: 10.26583/bit.2017.4.06

Abstract: В настоящей статье рассматривается актуальная задача в области защиты информации, обусловленная отсутствием алгоритмического аппарата управления событиями безопасности и автоматизации процедур определения набора регистрируемых событий безопасности. В первой части статьи сформулирована постановка математической задачи, подлежащей автоматизации… read more here.

Keywords: event management; management development; software security; security event ... See more keywords