Bhatt et al., 2014 - Google Patents
The operational role of security information and event management systemsBhatt et al., 2014
View PDF- Document ID
- 407581162001434553
- Author
- Bhatt S
- Manadhata P
- Zomlot L
- Publication year
- Publication venue
- IEEE security & Privacy
External Links
Snippet
An integral part of an enterprise computer security incident response team (CSIRT), the security operations center (SOC) is a centralized unit tasked with real-time monitoring and identification of security incidents. Security information and event management (SIEM) …
- 230000000694 effects 0 abstract description 12
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhatt et al. | The operational role of security information and event management systems | |
| Zipperle et al. | Provenance-based intrusion detection systems: A survey | |
| Salitin et al. | The role of User Entity Behavior Analytics to detect network attacks in real time | |
| US7530105B2 (en) | Tactical and strategic attack detection and prediction | |
| Han et al. | Provenance-based intrusion detection: opportunities and challenges | |
| US10728264B2 (en) | Characterizing behavior anomaly analysis performance based on threat intelligence | |
| US9531755B2 (en) | Field selection for pattern discovery | |
| Mishra et al. | Implementation of BFS-NB hybrid model in intrusion detection system | |
| US9600659B1 (en) | User activity modelling, monitoring, and reporting framework | |
| CN111726357A (en) | Attack behavior detection method and device, computer equipment and storage medium | |
| US10262133B1 (en) | System and method for contextually analyzing potential cyber security threats | |
| US20240020391A1 (en) | Log-based vulnerabilities detection at runtime | |
| Najafi et al. | SIEMA: bringing advanced analytics to legacy security information and event management | |
| US20250117485A1 (en) | Artificial intelligence (ai)-based system for detecting malware in endpoint devices using a multi-source data fusion and method thereof | |
| Gandhi et al. | Shield: Apt detection and intelligent explanation using llm | |
| US20140222496A1 (en) | Determining cost and risk associated with assets of an information technology environment | |
| Kaur et al. | Ueba with log analytics | |
| Grojek et al. | Ontology-driven artificial intelligence in IoT forensics | |
| KR102311997B1 (en) | Apparatus and method for endpoint detection and response terminal based on artificial intelligence behavior analysis | |
| Bowman et al. | NetHawk: Hunting advanced persistent threats via structural and temporal graph anomalies | |
| Bo et al. | Tom: A threat operating model for early warning of cyber security threats | |
| Wendt | AI for Defense | |
| Preuveneers et al. | On the use of AutoML for combating alert fatigue in security operations centers | |
| Velpula et al. | Behavior-anomaly-based system for detecting insider attacks and data mining | |
| Alharthi et al. | Cloud investigation automation framework (ciaf): An ai-driven approach to cloud forensics |