Academic literature on the topic 'Security log'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security log.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security log"

1

Lobo, Colin. "Security Log Management." Network Security 2003, no. 11 (2003): 6–9. http://dx.doi.org/10.1016/s1353-4858(03)01106-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rajebhosale, Sagar Shankar, and Mohan Chandrabhan Nikam. "Development of Secured Log Management System Over Blockchain Technology." International Journal of Cyber Research and Education 1, no. 1 (2019): 38–42. http://dx.doi.org/10.4018/ijcre.2019010104.

Full text
Abstract:
A log is a record of events that happens within an organization containing systems and networks. These logs are very important for any organization, because a log file will able to record all user activities. Due to this, log files play a vital role and contain sensitive information, and therefore security should be a high priority. It is very important to the proper functioning of any organization, to securely maintain log records over an extended period of time. So, management and maintenance of logs is a very difficult task. However, deploying such a system for high security and privacy of log records may be overhead for an organization and require additional costs. Many techniques have been designed for security of log records. The alternative solution for maintaining log records is using Blockchain technology. A blockchain will provide security of the log files. Log files over a Blockchain environment leads to challenges with a decentralized storage of log files. This article proposes a secured log management over Blockchain and the use of cryptographic algorithms for dealing the issues to access a data storage. This proposed technology may be one complete solution to the secure log management problem.
APA, Harvard, Vancouver, ISO, and other styles
3

Stabell-Kulø, Tage. "Security and log structured file systems." ACM SIGOPS Operating Systems Review 31, no. 2 (1997): 9–10. http://dx.doi.org/10.1145/250007.250009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Ruiyang. "Data Security Threats of Log Aggregation." SHS Web of Conferences 170 (2023): 01007. http://dx.doi.org/10.1051/shsconf/202317001007.

Full text
Abstract:
The development of cloud computing and distributed technologies has shifted log management operations to an aggregated form. Diverse information devices as well as information systems perform data collection and status analysis through a unified log aggregation management system. However, with the increasingly diverse business forms, the threats confronted by log aggregation systems are also mounting, among which data leakage, data tampering, data loss, and security vulnerabilities dominate the main positions. Data leakage imposes a severe challenge to the data privacy of enterprises and users, data tampering misleads the information system of enterprises and even adversely affects the decision-making of enterprises, data loss devastates the past data of enterprises and impinges on the operation of enterprises, and security vulnerabilities inflict potential safety hazards to the information systems accessed to log aggregation.
APA, Harvard, Vancouver, ISO, and other styles
5

Xing, Yanbo. "Design of a Network Security Audit System Based on Log Data Mining." Wireless Communications and Mobile Computing 2022 (February 25, 2022): 1–7. http://dx.doi.org/10.1155/2022/6737194.

Full text
Abstract:
The purpose of network security auditing is to safeguard network and information security through the assessment of network security vulnerabilities. Data mining is mainly used to mine potential information from massive amounts of log data, which can provide both accurate and valuable auxiliary data for network security auditing and relevant information for monitoring and management of terminals in different network environments. Firstly, the theory of data mining technology is explained, secondly, some data mining algorithms applied to network security audit are discussed, and finally, the design difficulties and functions of the network security audit system based on data mining are studied, aiming to provide reference for securing network and identifying hidden risks.
APA, Harvard, Vancouver, ISO, and other styles
6

Abbott, Robert G., Jonathan McClain, Benjamin Anderson, Kevin Nauer, Austin Silva, and Chris Forsythe. "Log Analysis of Cyber Security Training Exercises." Procedia Manufacturing 3 (2015): 5088–94. http://dx.doi.org/10.1016/j.promfg.2015.07.523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Casey, Donal. "Turning log files into a security asset." Network Security 2008, no. 2 (2008): 4–7. http://dx.doi.org/10.1016/s1353-4858(08)70016-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Nan Ju, Hoon Jeong, Hye Jin Pyo, and Eui In Choi. "Security Framework Using Forensic Function and Log Management." Applied Mechanics and Materials 590 (June 2014): 752–55. http://dx.doi.org/10.4028/www.scientific.net/amm.590.752.

Full text
Abstract:
The explosive development of the IT field, the number of structured and unstructured data is increasing in geometrical. Also, using these data a number of cyber-crime has occurred. So, the security threat in many areas is a serious problem.The importance of Big Data and analysis techniques has been developing.But, efforts about security are showing a low level relatively.In this paper, we are discussed about security threat and security technology. And, we proposed a new security technique that complements traditional security techniques.
APA, Harvard, Vancouver, ISO, and other styles
9

Subakti, Adityo Jaya. "Analysis of Lapan Security Access Based on Firewall Log in Center Eight." Jurnal Manajemen Informatika Medicom (JMI) 10, no. 2 (2022): 26–31. http://dx.doi.org/10.35335/jmi.v10i2.5.

Full text
Abstract:
Analysis of Network Security Access Space Agency Based Firewall Log In LAPAN Center. Supervisor LIPUR SUGIYANTA, Ph.D and Drs. BACHREN ZAINI, M.Pd. Increased Denial Of Service attacks, and other types of computer network interference, making security an important issue to be considered by all those who take advantage of the presence of the virtual world today. LAPAN Center system along with the information contained within is no exception contained attacks on access computer network security. Such attacks can be prevented at an early stage by analyzing at each access that will go on network security in LAPAN. This research at Analysis of Network Access to know and learn access of network security in firewall log LAPAN Center. This research was conducted with several stages of observation and interviews to employees of LAPAN Center infrastructure. After the stage of observation and interviews, the researchers conducted further data collection and analysis of firewall logs. The study states that the analysis of security access network based firewall log in LAPAN Center in the form of six messages that occur when a network will pass through the firewall. It can be concluded that by doing some analysis phases of network security access based firewall log in LAPAN Center produces a record of every incident inside the firewall logs. The study states that the analysis of security access network based firewall log in LAPAN Center in the form of six messages that occur when a network will pass through the firewall. It can be concluded that by doing some analysis phases of network security access based firewall log in LAPAN Center produces a record of every incident inside the firewall logs. The study states that the analysis of security access network based firewall log in LAPAN Center in the form of six messages that occur when a network will pass through the firewall. It can be concluded that by doing some analysis phases of network security access based firewall log in LAPAN Center produces a record of every incident inside the firewall logs
APA, Harvard, Vancouver, ISO, and other styles
10

Kurniawan, Kabul, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, and A. Min Tjoa. "VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis." Machine Learning and Knowledge Extraction 4, no. 2 (2022): 371–96. http://dx.doi.org/10.3390/make4020016.

Full text
Abstract:
The integration of heterogeneous and weakly linked log data poses a major challenge in many log-analytic applications. Knowledge graphs (KGs) can facilitate such integration by providing a versatile representation that can interlink objects of interest and enrich log events with background knowledge. Furthermore, graph-pattern based query languages, such as SPARQL, can support rich log analyses by leveraging semantic relationships between objects in heterogeneous log streams. Constructing, materializing, and maintaining centralized log knowledge graphs, however, poses significant challenges. To tackle this issue, we propose VloGraph—a distributed and virtualized alternative to centralized log knowledge graph construction. The proposed approach does not involve any a priori parsing, aggregation, and processing of log data, but dynamically constructs a virtual log KG from heterogeneous raw log sources across multiple hosts. To explore the feasibility of this approach, we developed a prototype and demonstrate its applicability to three scenarios. Furthermore, we evaluate the approach in various experimental settings with multiple heterogeneous log sources and machines; the encouraging results from this evaluation suggest that the approach can enable efficient graph-based ad-hoc log analyses in federated settings.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security log"

1

Egeland, Vegard. "LogWheels: A Security Log Visualizer." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13832.

Full text
Abstract:
Logging security incidents is a required security measure in every moderately complex computer system. But while most systems produce large quantities of textual logs, these logs are often neglected or infrequently monitored by untrained personnel. One of the reasons for this neglect is the poor usability offered by distributed repositories of plain text log data, using different log formats and contradictory terminology. The use of security visualization has established itself as a promising research area, aiming to improve the usability of security logs by utilizing the visual perception system's abilities to absorb large data quantities. This thesis examines the state of the art in security log usability, and proposes two ideas to the areas of security log usability and security visualization: First, we introduce LogWheels, an interactive dashboard offering remote monitoring of security incident logs, through a user friendly visualization interface. By offering three levels of granularity, LogWheels provides both an overview of the entire system, and the opportunity to request details on demand. Second, we introduce the incident wheel, the core visualization component of LogWheels. The incident wheel presents three key dimensions of security incidents -- 'what', 'when', and 'where' -- all within a single screen. In addition to a specification of LogWheels architecture and visualization scheme, the thesis is accompanied by a functional proof-of-concept, which allows demonstrations of the system on real or simulated security data.
APA, Harvard, Vancouver, ISO, and other styles
2

Smedlund, Kristoffer. "Enhancing the security of an audit log." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-372076.

Full text
Abstract:
In todays society data breaches have become an all too common issue. Insecure databases allows intruders to access sensitive data. This thesis examines how to enhance the security of a relational database. The database is used as an audit log in a system platform at LeanOn AB. The security enhancements are made by implementing cryptographic hash sums to ensure that the data in the database can’t be altered without detection, and by implementing symmetric cryptography to ensure that only authorized people can read and write the data. Some basic security features that the database management system provides are also used. The thesis project resulted in a database with an enhanced security compared to the old database design. This did however come at the cost of performance as the new design significantly lowered the scalability of the database.
APA, Harvard, Vancouver, ISO, and other styles
3

Rutherford, Andrew. "Introducing hippocratic log files for personal privacy control." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/171.

Full text
Abstract:
The rapid growth of the Internet has served to intensify existing privacy concerns of the individual, to the point that privacy is the number one concern amongst Internet users today. Tools exist that can provide users with a choice of anonymity or pseudonymity. However, many Web transactions require the release of personally identifying information, thus rendering such tools infeasible in many instances. Since it is then a given that users are often required to release personal information, which could be recorded, it follows that they require a greater degree of control over the information they release. Hippocratic databases, designed by Agrawal, Kiernan, Srikant, and Xu (2002), aim to give users greater control over information stored in a data- base. Their design was inspired by the medical Hippocratic oath, and makes data privacy protection a fundamental responsibility of the database itself. To achieve the privacy of data, Hippocratic databases are governed by 10 key privacy principles. This dissertation argues, that asides from a few challenges, the 10 prin- ciples of Hippocratic databases can be applied to log ¯les. This argument is supported by presenting a high-level functional view of a Hippocratic log file architecture. This architecture focuses on issues that highlight the con- trol users gain over their personal information that is collected in log files. By presenting a layered view of the aforementioned architecture, it was, fur- thermore, possible to provide greater insight into the major processes that would be at work in a Hippocratic log file implementation. An exploratory prototype served to understand and demonstrate certain of the architectural components of Hippocratic log files. This dissertation, thus, makes a contribution to the ideal of providing users with greater control over their personal information, by proposing the use of Hippocratic logfiles.
APA, Harvard, Vancouver, ISO, and other styles
4

Knutsson, Karl. "Security Without Cost : A Cryptographic Log-structured File System." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4715.

Full text
Abstract:
Historically, cryptographic file systems have been several times slower than non-cryptographic file systems. This paper describes the design and implementation of a fast Cryptographic Log-structured File System on OpenBSD. We experimentally demonstrate that our pro-totype file system performs close to the Fast File System (FFS) and the Log-structured File System (LFS). To increase performance, our file system performs most encryption and decryption work during disk read and write operations. This is possible thanks to the SEAL encryption algorithm, a software optimized stream cipher that allows the en-cryption work to be performed prior to the actual data is available. We believe that our cryptographic file system design is ideal for optimal read and write performance on locally stored confidential data.<br>Denna uppsats beskriver utvecklingen av ett kryptografiskt log-strukturerat filsystem och vi visar genom experiment att dess prestanda är jämförbar med lokala filsystem.<br>Karl Knutsson Skiftesgatan 40 332 35 Gislaved Sweden
APA, Harvard, Vancouver, ISO, and other styles
5

Dernaïka, Farah. "A posteriori log analysis and security rules violation detection." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0210.

Full text
Abstract:
Dans certains environnements sensibles, tels que le domaine de la santé, où les utilisateurs sont généralement de confiance et où des évènements particuliers peuvent se produire, comme les situations d’urgence, les contrôles de sécurité mis en place dans les systèmes d’information correspondants ne doivent pas bloquer certaines décisions et actions des utilisateurs. Cela pourrait avoir des conséquences graves. En revanche, il est important de pouvoir identifier et tracer ces actions et ces décisions afin de détecter d’éventuelles violations de la politique de sécurité mise en place et fixer les responsibilités. Ces fonctionnalités sont assurées par le contrôle d’accès à posteriori qui se base un mécanisme de monitoring à partir des logs. Dans la littérature, ce type de contrôle de sécurité a été divisé en trois étapes qui sont : le traitement des logs, l’analyse des logs, et l’imputabilité. Dans cette thèse, nous couvrons ces trois domaines du contrôle d’accès à posteriori en apportant de nouvelles solutions, et nous introduisons des nouveaux aspects qui n’avaient pas été abordés auparavant<br>In certain sensitive environments, such as the healthcare domain, where users are generally trusted and where particular events may occur, such as emergencies, the implemented security controls in the corresponding information systems should not block certain decisions and actions of users. This could have serious consequences. Indeed, it is important to be able to identify and trace these actions and decisions in order to detect possible violations of the security policy put in place and fix responsibilities. These functions are ensured by the a posteriori access control that lies on a monitoring mechanism based on logs. In the literature, this type of access control hasbeen divided into three stages: log processing, log analysis, and accountability. In this thesis, we cover these three areas of the a posteriori access control by providing new solutions, and we introduce new aspects that have not been addressed before
APA, Harvard, Vancouver, ISO, and other styles
6

Radley, Johannes Jurgens. "Pseudo-random access compressed archive for security log data." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1020019.

Full text
Abstract:
We are surrounded by an increasing number of devices and applications that produce a huge quantity of machine generated data. Almost all the machine data contains some element of security information that can be used to discover, monitor and investigate security events.The work proposes a pseudo-random access compressed storage method for log data to be used with an information retrieval system that in turn provides the ability to search and correlate log data and the corresponding events. We explain the method for converting log files into distinct events and storing the events in a compressed file. This yields an entry identifier for each log entry that provides a pointer that can be used by indexing methods. The research also evaluates the compression performance penalties encountered by using this storage system, including decreased compression ratio, as well as increased compression and decompression times.
APA, Harvard, Vancouver, ISO, and other styles
7

Buys, Stephanus. "Log analysis aided by latent semantic mapping." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002963.

Full text
Abstract:
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the information captured in log events. Analysis of these events is critical during incident response, forensic investigations related to network breaches, hacking attacks and data leaks. Such analysis has led to the discipline of Security Event Analysis, also known as Log Analysis. There are several challenges when dealing with events, foremost being the increased volumes at which events are often generated and stored. Furthermore, events are often captured as unstructured data, with very little consistency in the formats or contents of the events. In this environment, security analysts and implementers of Log Management (LM) or Security Information and Event Management (SIEM) systems face the daunting task of identifying, classifying and disambiguating massive volumes of events in order for security analysis and automation to proceed. Latent Semantic Mapping (LSM) is a proven paradigm shown to be an effective method of, among other things, enabling word clustering, document clustering, topic clustering and semantic inference. This research is an investigation into the practical application of LSM in the discipline of Security Event Analysis, showing the value of using LSM to assist practitioners in identifying types of events, classifying events as belonging to certain sources or technologies and disambiguating different events from each other. The culmination of this research presents adaptations to traditional natural language processing techniques that resulted in improved efficacy of LSM when dealing with Security Event Analysis. This research provides strong evidence supporting the wider adoption and use of LSM, as well as further investigation into Security Event Analysis assisted by LSM and other natural language or computer-learning processing techniques.<br>LaTeX with hyperref package<br>Adobe Acrobat 9.54 Paper Capture Plug-in
APA, Harvard, Vancouver, ISO, and other styles
8

Zeba, Vedrana, and Lykke Levin. "Security vs. Usability: designing a secure and usable access control event log." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20614.

Full text
Abstract:
Säkerhet och användbarhet beskrivs ofta som motpoler. I detta examensarbete så undersöks möjligheterna till att inkorporera både säkerhet och användbarhet i ett passagekontrollsgränssnitt. Forskningen är fokuserad på den del av passagekontrollen som benämns som händelseloggen. Loggens ändamål är att lagra och presentera information om händelser som sker i övervakade entréer. Syftet med forskningen är att undersöka i vilken utsträckning det är möjligt att implementera användarkrav och samtidigt uppfylla säkerhets- och användbarhetsheuristik. En klassisk interaktionsdesignsprocess utförs. Semi-strukturerade intervjuer genomförs med respondenter från två olika målgrupper, för att kontrollera om deras behov skiljer sig åt. Den ena gruppen består av användare som primärt jobbar med säkerhetsrelaterade arbetsuppgifter medan den andra gruppen har säkerhet som sekundär arbetsuppgift. Svaren analyseras genom en tematisk analys. Analysen resulterar i fyra olika teman innehållandes 26 stycken användarkrav. Användarkraven och heuristiken tas i beaktning när en prototyp skapas. Prototypen utvärderas sedan genom en heuristisk utvärdering av experter. Resultatet av denna forskning tyder på att användarkrav bidrar till att uppfylla heuristik. Utöver detta, så visar det sig att de två målgrupperna, på flera punkter, har olika behov. Användarkrav som härstammar från den första gruppen anses vara mer dynamiska och omedelbara, medan den andra gruppen har krav som är desto mer statiska och sporadiska.<br>Security and usability are often thought of as being contradictive. In this thesis, we explore the possibility of incorporating both security and usability in an access control GUI. The research is concentrated towards the part of the access control that is referred to as the event log. The purpose of the log is to store and present information about events that occur at monitored entry points. The intention of the research is to investigate to what extent it is possible to implement user requirements, while still complying with security and usability heuristics. A traditional interaction design process is conducted. Semi-structured interviews are held with respondents from two different target groups, to see if their needs differ. One of the groups consists of users who primarily do security related work, and the other one consists of users who have security as a secondary job assignment. The answers undergo a thematic analysis. The outcome of the analysis is four different themes, consisting of a total of 26 user requirements. The user requirements and the heuristics are taken into consideration when creating a prototype. The prototype is then subjected to a heuristic evaluation by experts. The results of this research indicate that the gathering of user requirements does aid the compliance with heuristics. Moreover, the user needs between the two groups do differ on several accounts. The requirements that originate from the first group can be thought of as more dynamic and instantaneous, while the other group has requirements that are more static and occasional.
APA, Harvard, Vancouver, ISO, and other styles
9

Dubuc, Clémence. "A Real- time Log Correlation System for Security Information and Event Management." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300452.

Full text
Abstract:
The correlation of several events in a period of time is a necessity for a threat detection platform. In the case of multistep attacks (attacks characterized by a sequence of executed commands), it allows detecting the different steps one by one and correlating them to raise an alert. It also allows detecting abnormal behaviors on the IT system, for example, multiple suspicious actions performed by the same account. The correlation of security events increases the security of the system and reduces the number of false positives. The correlation of the events is made thanks to pre- existing correlation rules. The goal of this thesis is to evaluate the feasibility of using a correlation engine based on Apache Spark. There is a necessity of changing the actual correlation system because it is not scalable, it cannot handle all the incoming data and it cannot perform some types of correlation like aggregating the events by attributes or counting the cardinality. The novelty is the improvement of the performance and the correlation capacities of the system. Two systems are proposed for correlating events in this project. The first one is based on Apache Spark Structured Streaming and analyzed the flow of security logs in real- time. As the results are not satisfactory, a second system is implemented. It uses a more traditional approach by storing the logs into an Elastic Search cluster and does correlation queries on it. In the end, the two systems are able to correlate the logs of the platform. Nevertheless, the system based on Apache Spark uses too many resources by correlation rule and it is too expensive to launch hundreds of correlation queries at the same time. For those reasons, the system based on Elastic Search is preferred and is implemented in the workflow.<br>Korrelation av flera händelser under en viss tidsperiod är en nödvändighet för plattformen för hotdetektering. När det gäller attacker i flera steg (attacker som kännetecknas av en sekvens av utförda kommandon) gör det möjligt att upptäcka de olika stegen ett efter ett och korrelera dem för att utlösa en varning. Den gör det också möjligt att upptäcka onormala beteenden i IT- systemet, t.ex. flera misstänkta åtgärder som utförs av samma konto. Korrelationen av säkerhetshändelser ökar systemets säkerhet och minskar antalet falska positiva upptäckter. Korrelationen av händelserna görs tack vare redan existerande korrelationsregler. Målet med den här avhandlingen är att utvärdera genomförbarheten av en korrelationsmotor baserad på Apache Spark. Det är nödvändigt att ändra det nuvarande korrelationssystemet eftersom det inte är skalbart, det kan inte hantera alla inkommande data och det kan inte utföra vissa typer av korrelation, t.ex. aggregering av händelserna efter attribut eller beräkning av kardinaliteten. Det nya är att förbättra systemets prestanda och korrelationskapacitet. I detta projekt föreslås två system för korrelering av händelser. Det första bygger på Apache Spark Structured Streaming och analyserade flödet av säkerhetsloggar i realtid. Eftersom resultaten inte var tillfredsställande har ett andra system införts. Det använder ett mer traditionellt tillvägagångssätt genom att lagra loggarna i ett Elastic Searchkluster och göra korrelationsförfrågningar på dem. I slutändan kan de två systemen korrelera plattformens loggar. Det system som bygger på Apache Spark använder dock för många resurser per korrelationsregel och det är för dyrt att starta hundratals korrelationsförfrågningar samtidigt. Av dessa skäl föredras systemet baserat på Elastic Search och det implementeras i arbetsflödet.
APA, Harvard, Vancouver, ISO, and other styles
10

Onder, Hulusi. "A Security Management System Design." Thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608515/index.pdf.

Full text
Abstract:
This thesis analyzes the difficulties of managing the security of an enterprise network. The problem that this thesis study deals with is the central management of a large number and variety of services that provide organization-wide network and information security. This study addresses two problem areas: how to better manage the security of a network, and how to explain the security issues to upper management better. The study proposes a Security Management System (SMS) to be used for network security management, monitoring and reporting purposes. The system is a custom made, central management solution, which combines the critical performance indicators of the security devices and presents the results via web pages.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security log"

1

Publishers, BoxNox. Security Log Book : Security Incident Log Book, Security Log Book Format, Security Log in, Security Login: Security Incident Log Book. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Publishing, Rogue Plus. Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log In, Security Login. Createspace Independent Publishing Platform, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rahim, Monjara. Security Log Book: Security Incident Log Book, Security Log Book. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Staff, Journals for All. Log Security: Security Incident Log Book. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Staff, Journals for All. Security Log: Security Incident Log Book. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Security Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login,120 Pages. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brown, Harry. Security Log Book: Security Analysis Graham ,security Analysis ,security Log Book for Man ,security Log Book Women ,security Log Book Girl. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Security Guard Log Book: Security Incident Log Book, Security Log Book Format, Security Log in, Security Login,120 Pages. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Staff, Journals for All. Security Log Sheet: Security Incident Log Book. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security log"

1

Flegel, Ulrich. "Pseudonymizing Unix Log Files." In Infrastructure Security. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45831-x_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Basin, David, Patrick Schaller, and Michael Schläpfer. "Logging and Log Analysis." In Applied Information Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Edwards, Dr Jason. "Audit Log Management." In Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mora-Cruzatty, Andy, Jose Villacreses-Chancay, Cesar Moreira-Zambrano, Josselyn Pita-Valencia, and Leonardo Chancay-García. "Security Mechanisms and Log Correlation Systems." In Trends in Artificial Intelligence and Computer Engineering. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25942-5_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Seo, Jinwon, and Jin Kwak. "Log Pre-processor for Security Visualization." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41674-3_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khoury, Raphaël, Sébastien Gaboury, and Sylvain Hallé. "Three Views of Log Trace Triaging." In Foundations and Practice of Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-51966-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mansor, Hafizah, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, and Iakovos Gurulian. "Log Your Car: Reliable Maintenance Services Record." In Information Security and Cryptology. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54705-3_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jin, Junjie, and Wei Zhang. "System Log-Based Android Root State Detection." In Cloud Computing and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7_69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Jingbin, Qin Yu, Wei Liu, Shijun Zhao, Dengguo Feng, and Weifeng Luo. "Log-Based Control Flow Attestation for Embedded Devices." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gordon, Steven, Atsuko Miyaji, Chunhua Su, and Karin Sumongkayothin. "M-ORAM: A Matrix ORAM with Log N Bandwidth Cost." In Information Security Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31875-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security log"

1

Murphy, Adrian, Daniel Larsson, Fanny Söderlund, Ola Angelsmark, and Johan Eker. "Automated Log Message Embeddings." In 2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2024. http://dx.doi.org/10.1109/iotsms62296.2024.10710220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nipa, Nadira, Nizar Bouguila, and Zachary Patterson. "A Comparative Study of Log-Based Anomaly Detection Methods in Real-World System Logs." In 10th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013367000003944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Gursimar, and Dhawan Singh. "Leveraging Blockchain for Cloud Log Security and Compliance in AWS." In 2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). IEEE, 2025. https://doi.org/10.1109/sceecs64059.2025.10941068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sujan, Gontla Venkat, Hothur Ranga Neha, Cheekati Mani Shankar, and C. R. Kavitha. "Enhancing Cloud Security through Log Aggregation and Real-Time Alerts." In 2024 8th International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2024. https://doi.org/10.1109/iceca63461.2024.10800811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sumathy, R., S. Naveen, P. Dhinesh, P. Muhammadhu Nazar Ali, S. Srithikan, and A. Micheal Mathura Pio. "Improving Security with Smart Door Lock Access Log using ESP32." In 2024 10th International Conference on Electrical Energy Systems (ICEES). IEEE, 2024. https://doi.org/10.1109/icees61253.2024.10776900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Zhun, Baohua Huang, and Ningjiang Chen. "Log Parsing using Semantic Filtering based Prompt Learning." In 2024 IEEE 24th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2024. http://dx.doi.org/10.1109/qrs62785.2024.00072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Afshinpour, Bahareh, Massih-Reza Amini, and Roland Groz. "Semantic Log Partitioning: Towards Automated Root Cause Analysis." In 2024 IEEE 24th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2024. http://dx.doi.org/10.1109/qrs62785.2024.00069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Su, Rao, Bingyu Zheng, and Yong Lu. "Architecture Design of Android-based Log Retrieval System." In 2024 2nd International Conference On Mobile Internet, Cloud Computing and Information Security (MICCIS). IEEE, 2024. http://dx.doi.org/10.1109/miccis63508.2024.00044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Karande, Vishal, Erick Bauman, Zhiqiang Lin, and Latifur Khan. "SGX-Log." In ASIA CCS '17: ACM Asia Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3052973.3053034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zajeganović, Marija, Milan Pavlović, Danica Mamula Tartalja, and Silva Kostić. "An Approach to Improving Network Security Using Log Analysis." In Sixth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2022. http://dx.doi.org/10.31410/itema.2022.105.

Full text
Abstract:
Troubleshooting is the process of detecting, identifying and re­solving problems within a computer network by means of specific methods, tools and operations. Troubleshooting implies following a set of procedures or steps that conform to the security standards and policies of a company. Diagnosing the source of a problem can be done by tools for system moni­toring, recording log messages, manual testing of device configuration, as well as by tools for device operation analysis. The procedure for using log messages to resolve both common problems and those caused by attacks is explained in this paper. Furthermore, this paper describes the way securi­ty threat management systems use the contents of log messages to analyze hardware problems and malicious activities.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security log"

1

Kent, K., and M. P. Souppaya. Guide to computer security log management. National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.800-92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Farrag, Khalid. Utilizing Cloud Computing Log Events for Security Automation. Iowa State University, 2019. http://dx.doi.org/10.31274/cc-20240624-1574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schoonover, Jon R. Global Security at Los Alamos. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1434421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vigil, Robyn Ashlee. Los Alamos National Laboratory Comprehensive Security Briefing. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1501784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hagler, J. A. National Security Implications of Long-Term Deficit Spending. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada519892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Metternich, Ronald J. Security Force Assistance: Organization for the Long War. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada520009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sergeeva, Zlata. The Ban on Long-Term Natural Gas Contracts for the European Union: A Double-Edged Sword? King Abdullah Petroleum Studies and Research Center, 2023. http://dx.doi.org/10.30573/ks--2022-dp15.

Full text
Abstract:
Long-term natural gas contracts are necessary market instruments that provide supply security for customers and demand security for producers. Nevertheless, the European Commission recently announced a plan to ban long-term contracts for unabated fossil gas after 2049. This study shows that this plan may destabilize the market due to the lack of supply security for customers and demand security for producers. We find the following main results.
APA, Harvard, Vancouver, ISO, and other styles
8

Ussery, Larry E. Overview of Los Alamos Support to National Security Missions. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1074577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Goda, Gopi Shah, John Shoven, and Sita Nataraj Slavov. Removing the Disincentives in Social Security for Long Careers. National Bureau of Economic Research, 2007. http://dx.doi.org/10.3386/w13110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Oakley, Laura, and Andrew Hood. The social security system: long-term trends and recent changes. IFS, 2014. http://dx.doi.org/10.1920/bn.ifs.2014.00156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!