Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

Integrated network and security operation center: A systematic analysis

D Shahjee, N Ware - IEEE Access, 2022 - ieeexplore.ieee.org
Traditionally, network and security operation center teams have worked in silos despite
commonalities. The network operating center (NOC) team is to provide operationality and …

Matched and mismatched SOCs: A qualitative study on security operations center issues

FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili… - Proceedings of the …, 2019 - dl.acm.org
Organizations, such as companies and governments, created Security Operations Centers
(SOCs) to defend against computer security attacks. SOCs are central defense groups that …

[PDF][PDF] A Survey on Network Security Monitoring: Tools and Functionalities

ZS Younus, M Alanezi - Mustansiriyah Journal of Pure and Applied Sciences, 2023 - iasj.net
Recently, cybersecurity breaches have become more common, with varying levels of impact
ranging from simple to major losses of financial resources or data. The network …

Designing blockchain-based SIEM 3.0 system

N Miloslavskaya - Information & Computer Security, 2018 - emerald.com
Purpose Nowadays, to operate securely and legally and to achieve business objectives,
secure valuable assets and support uninterrupted business processes, all organizations …

An adaptable approach for successful siem adoption in companies

M Rosenberg, B Schneider, C Scherb… - arXiv preprint arXiv …, 2023 - arxiv.org
In corporations around the world, the topic of cybersecurity and information security is
becoming increasingly important as the number of cyberattacks on themselves continues to …

IoTBlockSIEM for information security incident management in the internet of things ecosystem

N Miloslavskaya, A Tolstoy - Cluster Computing, 2020 - Springer
The Internet unfolded enormous opportunities to the modern computing world where not
only humans but also computers and machines, as well as any tiny sensing devices, can …

[HTML][HTML] The guidelines to adopt an applicable SIEM solution

H Mokalled, R Catelli, V Casola, D Debertol… - Journal of Information …, 2019 - scirp.org
The need for SIEM (Security Information and even Management) systems increased in the
last years. Many companies seek to reinforce their security capabilities to better safeguard …

[PDF][PDF] A user-centric approach to explainable AI in a security operation center environment.

HS Eriksson - 2022 - duo.uio.no
Living in the information age, countries, societies, and individuals become ever more
emerged in technology for each passing day. However, with every new software, hardware …

Towards XAI in the SOC–a user centric study of explainable alerts with SHAP and LIME

HS Eriksson, G Grov - … Conference on Big Data (Big Data), 2022 - ieeexplore.ieee.org
Many studies of the adoption of machine learning (ML) in Security Operation Centres
(SOCs) have pointed to a lack of transparency and explanation–and thus trust–as a barrier …