CISUC

A Comparative Study of Correlation Engines for Security Event Management

Authors



Keywords

Correlation Engines, Security Event Management

Subject

Correlation Engines, Security Event Management

Related Project

iCIS - Intelligent Computing in the Internet of Services

Conference

In Proc. of 10th Int. Conf. on Cyber Warfare and Security (ICCWS-2015). ISBN: 978-1-910309-98-8 ISSN: 2048-9897, March 2015


Cited by

Year 2020 : 2 citations

 M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020.
doi: 10.1109/TII.2019.2926557

 Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020.
doi: 10.1109/TII.2019.2925422

Year 2019 : 1 citations

 Veeramany A, Hutton WJ, III, Sridhar S, Gourisetti S, Coles G, Skare P. A Framework for Development of Risk-Informed Autonomous Adaptive Cyber Controller. ASME. J. Comput. Inf. Sci. Eng. 2019;():1-31. DOI:10.1115/1.4043040

Year 2017 : 3 citations

 Sandeep Sekharan, S & Kandasamy, Kamalanathan. (2017). Profiling SIEM tools and correlation engines for security analytics. in Proc of Conference: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 717-721. DOI: 10.1109/WiSPNET.2017.8299855.

 VICTOR W. GITUKU, "A LOW COST SYSTEM FOR LOGON ANOMALY DETECTION BASED ON TIME AND LOCATION OF USERS ", MSc Thesis, UNITED STATES INTERNATIONAL UNIVERSITY - AFRICA, summer 2017. Available at: http://usiuservicedesk.usiu.ac.ke/bitstream/handle/11732/3533/VICTOR W GITUKU MSC 2017.pdf?sequence=1&isAllowed=y

 Olivier Wang. Adaptive Rules Model : Statistical Learning for Rule-Based Systems. Machine Learning [cs.LG]. Université Paris-Saclay, 2017. English. . , PhD Thesis

Year 2016 : 4 citations

 Steinegger, RH, Hintz, N., Hippchen, B., Binder, G., Roeser, F., & Abeck, S. (2016, April). Log analysis with open source tools. In software technologies and processes: open source software in the industry, SMEs and the university environment 5. Conference STEP, 3.5. 2016 Furtwangen (p. 7). Walter de Gruyter GmbH & Co KG.

 C. Suh-Lee, Ju-Yeon Jo and Yoohwan Kim, "Text mining for security threat detection discovering hidden information in unstructured log messages," 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, 2016, pp. 252-260. doi: 10.1109/CNS.2016.7860492

 Underwood, M. (2016) Big Data Complex Event Processing for Internet of Things Provenance: Benefits for Audit, Forensics, and Safety, in Cyber-Assurance for the Internet of Things (ed T. T. Brooks), John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9781119193784.ch8

 A. Awad, S. Kadry, B. Lee, G. Maddodi and E. O'Meara, "Integrity Assurance in the Cloud by Combined PBA and Provenance," 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST), Cardiff, UK, 2016, pp. 127-132.doi: 10.1109/NGMAST.2016.15

Year 2015 : 1 citations

 Gianfranco Cerullo, Luigi Coppolino, Salvatore D’Antonio, Valerio Formicola, Gaetano Papale, Bruno Ragucci, “Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation“, in Proc. of the 9th Int. Symposium on Intelligent Distributed Computing – IDC'2015, Guimarães, Portugal, October 2015, Springer Studies in Computational Intelligence V. 616, pp 427-437, October 2015. DOI: 10.1007/978-3-319-25017-5_40.