Fellegi et al.
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US20060031938A1 (en) | Integrated emergency response system in information infrastructure and operating method therefor | |
| Kent et al. | Guide to computer security log management | |
| US7644438B1 (en) | Security event aggregation at software agent | |
| KR101327317B1 (en) | Apparatus and method for sap application traffic analysis and monitoring, and the information protection system thereof | |
| US8640234B2 (en) | Method and apparatus for predictive and actual intrusion detection on a network | |
| JP4688420B2 (en) | System and method for enhancing electronic security | |
| US20080201464A1 (en) | Prevention of fraud in computer network | |
| CN111274276A (en) | Operation auditing method and device, electronic equipment and computer-readable storage medium | |
| Azmi Bin Mustafa Sulaiman et al. | SIEM network behaviour monitoring framework using deep learning approach for campus network infrastructure | |
| Maddhi et al. | Safeguarding Log Data Integrity: Employing DES Encryption Against Manipulation Attempts | |
| Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
| Kent et al. | Sp 800-92. guide to computer security log management | |
| Stallings | Data loss prevention as a privacy-enhancing technology | |
| LaPadula | State of the art in anomaly detection and reaction | |
| Awodele et al. | A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS). | |
| Fellegi et al. | X-log Incident-Monitor System for Internal Control | |
| JP2006295232A (en) | Security monitoring device, security monitoring method, and program | |
| Kushwah et al. | An approach to meta-alert generation for anomalous tcp traffic | |
| CN115695044B (en) | IT asset security management and control platform and management method | |
| Akinsola et al. | Network Vulnerability Analysis for Internet of Things (IoT)-based Cyber Physical Systems (CPS) Using Digital Forensics | |
| Martsenyuk et al. | Features of technology of protection against unauthorizedly installed monitoring software products. | |
| Mundt et al. | Cyber Crime Undermines Data Privacy | |
| Smaha et al. | Software Tools for Detecting Misuse on Unix Systems | |
| Patel | Importance of Intrusion Detection System on Different Intrusion Attacks | |
| Metcalf et al. | Intrusion Detection System Requirements. A Capabilities Description in Terms of the Network Monitoring and Assessment Module of CSAP21 |