Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement
MH Chung, Y Yang, L Wang, G Cento, K Jerath… - ACM Computing …, 2023 - dl.acm.org
In this article we consider the problem of defending against increasing data exfiltration
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …
Systematic review of SIEM technology: SIEM-SC birth
JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …
System Information and Event Management (SIEM) technology and what may possibly be …
AutoLog: Anomaly detection by deep autoencoding of system logs
The use of system logs for detecting and troubleshooting anomalies of production systems
has been known since the early days of computers. In spite of the advances in the area, the …
has been known since the early days of computers. In spite of the advances in the area, the …
Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning
AR Muhammad, P Sukarno, AA Wardana - Procedia Computer Science, 2023 - Elsevier
Abstract This research builds Security Information & Event Management (SIEM) based on
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …
Integrating digital twin security simulations in the security operations center
While industrial environments are increasingly equipped with sensors and integrated to
enterprise networks, current security strategies are generally not prepared for the growing …
enterprise networks, current security strategies are generally not prepared for the growing …
Blockchain-based cyber threat intelligence system architecture for sustainable computing
Nowadays, the designing of cyber-physical systems has a significant role and plays a
substantial part in developing a sustainable computing ecosystem for secure and scalable …
substantial part in developing a sustainable computing ecosystem for secure and scalable …
Nebula: Self-Attention for Dynamic Malware Analysis
Dynamic analysis enables detecting Windows malware by executing programs in a
controlled environment and logging their actions. Previous work has proposed training …
controlled environment and logging their actions. Previous work has proposed training …
Contextual filtering and prioritization of computer application logs for security situational awareness
Critical computer systems strongly rely on event logs to record the occurrence of normative
and anomalous events occurring at runtime. In spite of the advances in Security Information …
and anomalous events occurring at runtime. In spite of the advances in Security Information …
Identifying critical factors and trends leading to fatal accidents in small-scale construction sites in Korea
JM Hwang, JH Won, HJ Jeong, SH Shin - Buildings, 2023 - mdpi.com
Small-scale construction sites in South Korea account for about 91.5% of all construction
workplaces and contribute to 72.3% of the total accidents and fatalities. Safety measures at …
workplaces and contribute to 72.3% of the total accidents and fatalities. Safety measures at …
Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs
The proliferation of cyber threats necessitates robust security measures to safeguard critical
assets and data in today's evolving digital landscape. Small and Medium Enterprises …
assets and data in today's evolving digital landscape. Small and Medium Enterprises …