Security operations center: A systematic study and open challenges
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …
importance has grown significantly, especially over the last five years. This is mainly due to …
Integrated network and security operation center: A systematic analysis
D Shahjee, N Ware - IEEE Access, 2022 - ieeexplore.ieee.org
Traditionally, network and security operation center teams have worked in silos despite
commonalities. The network operating center (NOC) team is to provide operationality and …
commonalities. The network operating center (NOC) team is to provide operationality and …
Matched and mismatched SOCs: A qualitative study on security operations center issues
Organizations, such as companies and governments, created Security Operations Centers
(SOCs) to defend against computer security attacks. SOCs are central defense groups that …
(SOCs) to defend against computer security attacks. SOCs are central defense groups that …
[PDF][PDF] A Survey on Network Security Monitoring: Tools and Functionalities
Recently, cybersecurity breaches have become more common, with varying levels of impact
ranging from simple to major losses of financial resources or data. The network …
ranging from simple to major losses of financial resources or data. The network …
Designing blockchain-based SIEM 3.0 system
N Miloslavskaya - Information & Computer Security, 2018 - emerald.com
Purpose Nowadays, to operate securely and legally and to achieve business objectives,
secure valuable assets and support uninterrupted business processes, all organizations …
secure valuable assets and support uninterrupted business processes, all organizations …
An adaptable approach for successful siem adoption in companies
M Rosenberg, B Schneider, C Scherb… - arXiv preprint arXiv …, 2023 - arxiv.org
In corporations around the world, the topic of cybersecurity and information security is
becoming increasingly important as the number of cyberattacks on themselves continues to …
becoming increasingly important as the number of cyberattacks on themselves continues to …
IoTBlockSIEM for information security incident management in the internet of things ecosystem
N Miloslavskaya, A Tolstoy - Cluster Computing, 2020 - Springer
The Internet unfolded enormous opportunities to the modern computing world where not
only humans but also computers and machines, as well as any tiny sensing devices, can …
only humans but also computers and machines, as well as any tiny sensing devices, can …
[HTML][HTML] The guidelines to adopt an applicable SIEM solution
The need for SIEM (Security Information and even Management) systems increased in the
last years. Many companies seek to reinforce their security capabilities to better safeguard …
last years. Many companies seek to reinforce their security capabilities to better safeguard …
[PDF][PDF] A user-centric approach to explainable AI in a security operation center environment.
HS Eriksson - 2022 - duo.uio.no
Living in the information age, countries, societies, and individuals become ever more
emerged in technology for each passing day. However, with every new software, hardware …
emerged in technology for each passing day. However, with every new software, hardware …
Towards XAI in the SOC–a user centric study of explainable alerts with SHAP and LIME
HS Eriksson, G Grov - … Conference on Big Data (Big Data), 2022 - ieeexplore.ieee.org
Many studies of the adoption of machine learning (ML) in Security Operation Centres
(SOCs) have pointed to a lack of transparency and explanation–and thus trust–as a barrier …
(SOCs) have pointed to a lack of transparency and explanation–and thus trust–as a barrier …