Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement

MH Chung, Y Yang, L Wang, G Cento, K Jerath… - ACM Computing …, 2023 - dl.acm.org
In this article we consider the problem of defending against increasing data exfiltration
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …

Systematic review of SIEM technology: SIEM-SC birth

JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …

AutoLog: Anomaly detection by deep autoencoding of system logs

M Catillo, A Pecchia, U Villano - Expert Systems with Applications, 2022 - Elsevier
The use of system logs for detecting and troubleshooting anomalies of production systems
has been known since the early days of computers. In spite of the advances in the area, the …

Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning

AR Muhammad, P Sukarno, AA Wardana - Procedia Computer Science, 2023 - Elsevier
Abstract This research builds Security Information & Event Management (SIEM) based on
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …

Integrating digital twin security simulations in the security operations center

M Dietz, M Vielberth, G Pernul - … of the 15th International Conference on …, 2020 - dl.acm.org
While industrial environments are increasingly equipped with sensors and integrated to
enterprise networks, current security strategies are generally not prepared for the growing …

Blockchain-based cyber threat intelligence system architecture for sustainable computing

J Cha, SK Singh, Y Pan, JH Park - Sustainability, 2020 - mdpi.com
Nowadays, the designing of cyber-physical systems has a significant role and plays a
substantial part in developing a sustainable computing ecosystem for secure and scalable …

Nebula: Self-Attention for Dynamic Malware Analysis

D Trizna, L Demetrio, B Biggio… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Dynamic analysis enables detecting Windows malware by executing programs in a
controlled environment and logging their actions. Previous work has proposed training …

Contextual filtering and prioritization of computer application logs for security situational awareness

M Cinque, R Della Corte, A Pecchia - Future Generation Computer Systems, 2020 - Elsevier
Critical computer systems strongly rely on event logs to record the occurrence of normative
and anomalous events occurring at runtime. In spite of the advances in Security Information …

Identifying critical factors and trends leading to fatal accidents in small-scale construction sites in Korea

JM Hwang, JH Won, HJ Jeong, SH Shin - Buildings, 2023 - mdpi.com
Small-scale construction sites in South Korea account for about 91.5% of all construction
workplaces and contribute to 72.3% of the total accidents and fatalities. Safety measures at …

Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs

J Manzoor, A Waleed, AF Jamali, A Masood - Plos one, 2024 - journals.plos.org
The proliferation of cyber threats necessitates robust security measures to safeguard critical
assets and data in today's evolving digital landscape. Small and Medium Enterprises …