Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures

G González-Granadillo, S González-Zarzosa, R Diaz - Sensors, 2021 - mdpi.com
Security Information and Event Management (SIEM) systems have been widely deployed as
a powerful tool to prevent, detect, and react against cyber-attacks. SIEM solutions have …

Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement

MH Chung, Y Yang, L Wang, G Cento, K Jerath… - ACM Computing …, 2023 - dl.acm.org
In this article we consider the problem of defending against increasing data exfiltration
threats in the domain of cybersecurity. We review existing work on exfiltration threats and …

Systematic review of SIEM technology: SIEM-SC birth

JM López Velásquez, SM Martínez Monterrubio… - International Journal of …, 2023 - Springer
This paper contains a systematic review carried out to address the current status of the
System Information and Event Management (SIEM) technology and what may possibly be …

Threat classification model for security information event management focusing on model efficiency

J Kim, HY Kwon - Computers & Security, 2022 - Elsevier
As various types of network threats have increased recently, manual threat response by
security analysts has become a limitation. To compensate for this, the importance of security …

The functional safety assessment of cyber-physical system operation process described by Markov chain

V Kovtun, I Izonin, M Gregus - Scientific Reports, 2022 - nature.com
The functional safety assessment is one of the primary tasks both at the design stage and at
the stage of operation of critical infrastructure at all levels. The article's main contribution is …

Advanced Persistent Threat intelligent profiling technique: A survey

BH Tang, JF Wang, Z Yu, B Chen, W Ge, J Yu… - Computers and Electrical …, 2022 - Elsevier
With the boom in Internet and information technology, cyber-attacks are becoming more
frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike …

SoK: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

A cyber resilience framework for NG-IoT healthcare using machine learning and blockchain

V Kelli, P Sarigiannidis, V Argyriou… - ICC 2021-IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) technology such as intelligent devices, sensors, actuators and
wearables have been integrated in the healthcare industry, thus contributing in the creation …

Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs

J Manzoor, A Waleed, AF Jamali, A Masood - Plos one, 2024 - journals.plos.org
The proliferation of cyber threats necessitates robust security measures to safeguard critical
assets and data in today's evolving digital landscape. Small and Medium Enterprises …

RADAMS: Resilient and adaptive alert and attention management strategy against informational denial-of-service (IDoS) attacks

L Huang, Q Zhu - Computers & Security, 2022 - Elsevier
Attacks exploiting human attentional vulnerability have posed severe threats to
cybersecurity. In this work, we identify and formally define a new type of proactive attentional …