Academic literature on the topic 'Security log'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security log.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security log"
Lobo, Colin. "Security Log Management." Network Security 2003, no. 11 (2003): 6–9. http://dx.doi.org/10.1016/s1353-4858(03)01106-1.
Full textRajebhosale, Sagar Shankar, and Mohan Chandrabhan Nikam. "Development of Secured Log Management System Over Blockchain Technology." International Journal of Cyber Research and Education 1, no. 1 (2019): 38–42. http://dx.doi.org/10.4018/ijcre.2019010104.
Full textStabell-Kulø, Tage. "Security and log structured file systems." ACM SIGOPS Operating Systems Review 31, no. 2 (1997): 9–10. http://dx.doi.org/10.1145/250007.250009.
Full textLiu, Ruiyang. "Data Security Threats of Log Aggregation." SHS Web of Conferences 170 (2023): 01007. http://dx.doi.org/10.1051/shsconf/202317001007.
Full textXing, Yanbo. "Design of a Network Security Audit System Based on Log Data Mining." Wireless Communications and Mobile Computing 2022 (February 25, 2022): 1–7. http://dx.doi.org/10.1155/2022/6737194.
Full textAbbott, Robert G., Jonathan McClain, Benjamin Anderson, Kevin Nauer, Austin Silva, and Chris Forsythe. "Log Analysis of Cyber Security Training Exercises." Procedia Manufacturing 3 (2015): 5088–94. http://dx.doi.org/10.1016/j.promfg.2015.07.523.
Full textCasey, Donal. "Turning log files into a security asset." Network Security 2008, no. 2 (2008): 4–7. http://dx.doi.org/10.1016/s1353-4858(08)70016-3.
Full textKim, Nan Ju, Hoon Jeong, Hye Jin Pyo, and Eui In Choi. "Security Framework Using Forensic Function and Log Management." Applied Mechanics and Materials 590 (June 2014): 752–55. http://dx.doi.org/10.4028/www.scientific.net/amm.590.752.
Full textSubakti, Adityo Jaya. "Analysis of Lapan Security Access Based on Firewall Log in Center Eight." Jurnal Manajemen Informatika Medicom (JMI) 10, no. 2 (2022): 26–31. http://dx.doi.org/10.35335/jmi.v10i2.5.
Full textKurniawan, Kabul, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, and A. Min Tjoa. "VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis." Machine Learning and Knowledge Extraction 4, no. 2 (2022): 371–96. http://dx.doi.org/10.3390/make4020016.
Full textDissertations / Theses on the topic "Security log"
Egeland, Vegard. "LogWheels: A Security Log Visualizer." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13832.
Full textSmedlund, Kristoffer. "Enhancing the security of an audit log." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-372076.
Full textRutherford, Andrew. "Introducing hippocratic log files for personal privacy control." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/171.
Full textKnutsson, Karl. "Security Without Cost : A Cryptographic Log-structured File System." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4715.
Full textDernaïka, Farah. "A posteriori log analysis and security rules violation detection." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0210.
Full textRadley, Johannes Jurgens. "Pseudo-random access compressed archive for security log data." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1020019.
Full textBuys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.
Full textZeba, Vedrana, and Lykke Levin. "Security vs. Usability: designing a secure and usable access control event log." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20614.
Full textDubuc, Clémence. "A Real- time Log Correlation System for Security Information and Event Management." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300452.
Full textOnder, Hulusi. "A Security Management System Design." Thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608515/index.pdf.
Full textBooks on the topic "Security log"
Publishers, BoxNox. Security Log Book : Security Incident Log Book, Security Log Book Format, Security Log in, Security Login: Security Incident Log Book. Independently Published, 2021.
Find full textSecurity Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.
Find full textPublishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.
Find full textRahim, Monjara. Security Log Book: Security Incident Log Book, Security Log Book. Independently Published, 2021.
Find full textStaff, Journals for All. Log Security: Security Incident Log Book. Independently Published, 2017.
Find full textStaff, Journals for All. Security Log: Security Incident Log Book. Independently Published, 2017.
Find full textSecurity Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login,120 Pages. Independently Published, 2020.
Find full textBrown, Harry. Security Log Book: Security Analysis Graham ,security Analysis ,security Log Book for Man ,security Log Book Women ,security Log Book Girl. Independently Published, 2021.
Find full textSecurity Guard Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login,120 Pages. Independently Published, 2020.
Find full textStaff, Journals for All. Security Log Sheet: Security Incident Log Book. Independently Published, 2017.
Find full textBook chapters on the topic "Security log"
Flegel, Ulrich. "Pseudonymizing Unix Log Files." In Infrastructure Security. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45831-x_12.
Full textBasin, David, Patrick Schaller, and Michael Schläpfer. "Logging and Log Analysis." In Applied Information Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_5.
Full textEdwards, Dr Jason. "Audit Log Management." In Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6_8.
Full textMora-Cruzatty, Andy, Jose Villacreses-Chancay, Cesar Moreira-Zambrano, Josselyn Pita-Valencia, and Leonardo Chancay-García. "Security Mechanisms and Log Correlation Systems." In Trends in Artificial Intelligence and Computer Engineering. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25942-5_50.
Full textSeo, Jinwon, and Jin Kwak. "Log Pre-processor for Security Visualization." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41674-3_41.
Full textKhoury, Raphaël, Sébastien Gaboury, and Sylvain Hallé. "Three Views of Log Trace Triaging." In Foundations and Practice of Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-51966-1_12.
Full textMansor, Hafizah, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, and Iakovos Gurulian. "Log Your Car: Reliable Maintenance Services Record." In Information Security and Cryptology. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54705-3_30.
Full textJin, Junjie, and Wei Zhang. "System Log-Based Android Root State Detection." In Cloud Computing and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7_69.
Full textLiu, Jingbin, Qin Yu, Wei Liu, Shijun Zhao, Dengguo Feng, and Weifeng Luo. "Log-Based Control Flow Attestation for Embedded Devices." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_10.
Full textGordon, Steven, Atsuko Miyaji, Chunhua Su, and Karin Sumongkayothin. "M-ORAM: A Matrix ORAM with Log N Bandwidth Cost." In Information Security Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31875-2_1.
Full textConference papers on the topic "Security log"
Murphy, Adrian, Daniel Larsson, Fanny Söderlund, Ola Angelsmark, and Johan Eker. "Automated Log Message Embeddings." In 2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2024. http://dx.doi.org/10.1109/iotsms62296.2024.10710220.
Full textNipa, Nadira, Nizar Bouguila, and Zachary Patterson. "A Comparative Study of Log-Based Anomaly Detection Methods in Real-World System Logs." In 10th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013367000003944.
Full textSingh, Gursimar, and Dhawan Singh. "Leveraging Blockchain for Cloud Log Security and Compliance in AWS." In 2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). IEEE, 2025. https://doi.org/10.1109/sceecs64059.2025.10941068.
Full textSujan, Gontla Venkat, Hothur Ranga Neha, Cheekati Mani Shankar, and C. R. Kavitha. "Enhancing Cloud Security through Log Aggregation and Real-Time Alerts." In 2024 8th International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2024. https://doi.org/10.1109/iceca63461.2024.10800811.
Full textSumathy, R., S. Naveen, P. Dhinesh, P. Muhammadhu Nazar Ali, S. Srithikan, and A. Micheal Mathura Pio. "Improving Security with Smart Door Lock Access Log using ESP32." In 2024 10th International Conference on Electrical Energy Systems (ICEES). IEEE, 2024. https://doi.org/10.1109/icees61253.2024.10776900.
Full textXu, Zhun, Baohua Huang, and Ningjiang Chen. "Log Parsing using Semantic Filtering based Prompt Learning." In 2024 IEEE 24th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2024. http://dx.doi.org/10.1109/qrs62785.2024.00072.
Full textAfshinpour, Bahareh, Massih-Reza Amini, and Roland Groz. "Semantic Log Partitioning: Towards Automated Root Cause Analysis." In 2024 IEEE 24th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2024. http://dx.doi.org/10.1109/qrs62785.2024.00069.
Full textSu, Rao, Bingyu Zheng, and Yong Lu. "Architecture Design of Android-based Log Retrieval System." In 2024 2nd International Conference On Mobile Internet, Cloud Computing and Information Security (MICCIS). IEEE, 2024. http://dx.doi.org/10.1109/miccis63508.2024.00044.
Full textKarande, Vishal, Erick Bauman, Zhiqiang Lin, and Latifur Khan. "SGX-Log." In ASIA CCS '17: ACM Asia Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3052973.3053034.
Full textZajeganović, Marija, Milan Pavlović, Danica Mamula Tartalja, and Silva Kostić. "An Approach to Improving Network Security Using Log Analysis." In Sixth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2022. http://dx.doi.org/10.31410/itema.2022.105.
Full textReports on the topic "Security log"
Kent, K., and M. P. Souppaya. Guide to computer security log management. National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-92.
Full textFarrag, Khalid. Utilizing Cloud Computing Log Events for Security Automation. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-1574.
Full textSchoonover, Jon R. Global Security at Los Alamos. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1434421.
Full textVigil, Robyn Ashlee. Los Alamos National Laboratory Comprehensive Security Briefing. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1501784.
Full textHagler, J. A. National Security Implications of Long-Term Deficit Spending. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada519892.
Full textMetternich, Ronald J. Security Force Assistance: Organization for the Long War. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada520009.
Full textSergeeva, Zlata. The Ban on Long-Term Natural Gas Contracts for the European Union: A Double-Edged Sword? King Abdullah Petroleum Studies and Research Center, 2023. http://dx.doi.org/10.30573/ks--2022-dp15.
Full textUssery, Larry E. Overview of Los Alamos Support to National Security Missions. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1074577.
Full textGoda, Gopi Shah, John Shoven, and Sita Nataraj Slavov. Removing the Disincentives in Social Security for Long Careers. National Bureau of Economic Research, 2007. http://dx.doi.org/10.3386/w13110.
Full textOakley, Laura, and Andrew Hood. The social security system: long-term trends and recent changes. IFS, 2014. http://dx.doi.org/10.1920/bn.ifs.2014.00156.
Full text