[go: up one dir, main page]

Bhatt et al., 2014 - Google Patents

The operational role of security information and event management systems

Bhatt et al., 2014

View PDF
Document ID
407581162001434553
Author
Bhatt S
Manadhata P
Zomlot L
Publication year
Publication venue
IEEE security & Privacy

External Links

Snippet

An integral part of an enterprise computer security incident response team (CSIRT), the security operations center (SOC) is a centralized unit tasked with real-time monitoring and identification of security incidents. Security information and event management (SIEM) …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bhatt et al. The operational role of security information and event management systems
Zipperle et al. Provenance-based intrusion detection systems: A survey
Salitin et al. The role of User Entity Behavior Analytics to detect network attacks in real time
US7530105B2 (en) Tactical and strategic attack detection and prediction
Han et al. Provenance-based intrusion detection: opportunities and challenges
US10728264B2 (en) Characterizing behavior anomaly analysis performance based on threat intelligence
US9531755B2 (en) Field selection for pattern discovery
Mishra et al. Implementation of BFS-NB hybrid model in intrusion detection system
US9600659B1 (en) User activity modelling, monitoring, and reporting framework
CN111726357A (en) Attack behavior detection method and device, computer equipment and storage medium
US10262133B1 (en) System and method for contextually analyzing potential cyber security threats
US20240020391A1 (en) Log-based vulnerabilities detection at runtime
Najafi et al. SIEMA: bringing advanced analytics to legacy security information and event management
US20250117485A1 (en) Artificial intelligence (ai)-based system for detecting malware in endpoint devices using a multi-source data fusion and method thereof
Gandhi et al. Shield: Apt detection and intelligent explanation using llm
US20140222496A1 (en) Determining cost and risk associated with assets of an information technology environment
Kaur et al. Ueba with log analytics
Grojek et al. Ontology-driven artificial intelligence in IoT forensics
KR102311997B1 (en) Apparatus and method for endpoint detection and response terminal based on artificial intelligence behavior analysis
Bowman et al. NetHawk: Hunting advanced persistent threats via structural and temporal graph anomalies
Bo et al. Tom: A threat operating model for early warning of cyber security threats
Wendt AI for Defense
Preuveneers et al. On the use of AutoML for combating alert fatigue in security operations centers
Velpula et al. Behavior-anomaly-based system for detecting insider attacks and data mining
Alharthi et al. Cloud investigation automation framework (ciaf): An ai-driven approach to cloud forensics