Journal articles on the topic 'Security log'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security log.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lobo, Colin. "Security Log Management." Network Security 2003, no. 11 (2003): 6–9. http://dx.doi.org/10.1016/s1353-4858(03)01106-1.
Full textRajebhosale, Sagar Shankar, and Mohan Chandrabhan Nikam. "Development of Secured Log Management System Over Blockchain Technology." International Journal of Cyber Research and Education 1, no. 1 (2019): 38–42. http://dx.doi.org/10.4018/ijcre.2019010104.
Full textStabell-Kulø, Tage. "Security and log structured file systems." ACM SIGOPS Operating Systems Review 31, no. 2 (1997): 9–10. http://dx.doi.org/10.1145/250007.250009.
Full textLiu, Ruiyang. "Data Security Threats of Log Aggregation." SHS Web of Conferences 170 (2023): 01007. http://dx.doi.org/10.1051/shsconf/202317001007.
Full textXing, Yanbo. "Design of a Network Security Audit System Based on Log Data Mining." Wireless Communications and Mobile Computing 2022 (February 25, 2022): 1–7. http://dx.doi.org/10.1155/2022/6737194.
Full textAbbott, Robert G., Jonathan McClain, Benjamin Anderson, Kevin Nauer, Austin Silva, and Chris Forsythe. "Log Analysis of Cyber Security Training Exercises." Procedia Manufacturing 3 (2015): 5088–94. http://dx.doi.org/10.1016/j.promfg.2015.07.523.
Full textCasey, Donal. "Turning log files into a security asset." Network Security 2008, no. 2 (2008): 4–7. http://dx.doi.org/10.1016/s1353-4858(08)70016-3.
Full textKim, Nan Ju, Hoon Jeong, Hye Jin Pyo, and Eui In Choi. "Security Framework Using Forensic Function and Log Management." Applied Mechanics and Materials 590 (June 2014): 752–55. http://dx.doi.org/10.4028/www.scientific.net/amm.590.752.
Full textSubakti, Adityo Jaya. "Analysis of Lapan Security Access Based on Firewall Log in Center Eight." Jurnal Manajemen Informatika Medicom (JMI) 10, no. 2 (2022): 26–31. http://dx.doi.org/10.35335/jmi.v10i2.5.
Full textKurniawan, Kabul, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, and A. Min Tjoa. "VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis." Machine Learning and Knowledge Extraction 4, no. 2 (2022): 371–96. http://dx.doi.org/10.3390/make4020016.
Full textPark, Ji Su. "Efficient Analysis and Detection of Intelligent Security Threats in Cloud Environment." Journal of Internet Technology 25, no. 4 (2024): 629–35. http://dx.doi.org/10.70003/160792642024072504013.
Full textPan, Lei, and Huichang Zhu. "An Intelligent Framework for Log Anomaly Detection Based on Log Template Extraction." Journal of Cases on Information Technology 25, no. 1 (2023): 1–23. http://dx.doi.org/10.4018/jcit.330145.
Full textZou, Feng, Xingshu Chen, Yonggang Luo, Tiemai Huang, Zhihong Liao, and Keer Song. "Spray: Streaming Log Parser for Real-Time Analysis." Security and Communication Networks 2022 (September 6, 2022): 1–11. http://dx.doi.org/10.1155/2022/1559270.
Full textLee, Dong-Gun, Huy Kang Kim, and Eunjin Kim. "Study on security log visualization and security threat detection using RGB Palette." Journal of the Korea Institute of Information Security and Cryptology 25, no. 1 (2015): 61–73. http://dx.doi.org/10.13089/jkiisc.2015.25.1.61.
Full textAli, Moch Dzikri Azhari, Asep Id Hadiana, and Melina Melina. "Securing Network Log Data Using Advance Encryption Standard Algorithm And Twofish With Common Event Format." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 341–53. https://doi.org/10.46336/ijqrm.v5i3.757.
Full textKumar, Ravi, and Parvesh Kumar Chaudhary. "Network Security Enhancement using CTI and Log Analysis." International Journal of Engineering and Computer Science 7, no. 12 (2018): 24430–32. http://dx.doi.org/10.18535/ijecs/v7i12.03.
Full textAZIZI, Yassine, Mostafa AZIZI, and Mohamed ELBOUKHARI. "Log files Analysis Using MapReduce to Improve Security." Procedia Computer Science 148 (2019): 37–44. http://dx.doi.org/10.1016/j.procs.2019.01.006.
Full textChe, Jianhua, Weimin Lin, Yong Yu, and Wei Yao. "Optimized Hypergraph Clustering-based Network Security Log Mining*." Physics Procedia 24 (2012): 762–68. http://dx.doi.org/10.1016/j.phpro.2012.02.113.
Full textOnah, Fidelis I., and Samuel Ukoha. "A VPN Security Log Management and Visualization System." IUP Journal of Telecommunications 17, no. 1 (2025): 54–74. https://doi.org/10.71329/iupjtc/2025.17.1.54-74.
Full textRasina Begum, B., and P. Chithra. "Cloud Based Secured Log Retrieval Using Fully Homomorphic Encryption." Asian Journal of Engineering and Applied Technology 9, no. 1 (2020): 13–17. http://dx.doi.org/10.51983/ajeat-2020.9.1.1084.
Full textJournal, IJSREM. "Smart Log Analyzer for Anomaly Detection in Distributed Systems." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–12. http://dx.doi.org/10.55041/ijsrem28072.
Full textWishah, Raed, and Azmi Shawkat Abdulbaqi. "Security and integrity of medical log records management in the cloud storage." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 7 (2023): 1961–70. http://dx.doi.org/10.47974/jdmsc-1784.
Full textAnton, Alin-Adrian, Petra Csereoka, Eugenia Ana Capota, and Răzvan-Dorel Cioargă. "Enhancing Syslog Message Security and Reliability over Unidirectional Fiber Optics." Sensors 24, no. 20 (2024): 6537. http://dx.doi.org/10.3390/s24206537.
Full textDaniel, A., and I.A Suleiman. "Design and implementation of computer based security and monitoring system for forensic experts." Journal of Scientific and Engineering Research 10, no. 8 (2023): 28–39. https://doi.org/10.5281/zenodo.10464142.
Full textQing, Xia. "Log-Based Network Security Audit System Research and Design." Advanced Materials Research 129-131 (August 2010): 1426–31. http://dx.doi.org/10.4028/www.scientific.net/amr.129-131.1426.
Full textZhao, Chenchen. "API Common Security Threats and Security Protection Strategies." Frontiers in Computing and Intelligent Systems 10, no. 2 (2024): 29–33. http://dx.doi.org/10.54097/k5djs164.
Full textTrivedi, Devharsh, Aymen Boudguiga, Nesrine Kaaniche, and Nikos Triandopoulos. "SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation." Cryptography 7, no. 4 (2023): 52. http://dx.doi.org/10.3390/cryptography7040052.
Full textPutra, Willy Permana, Renol Burjulius, Muhammad Anis Al Hilmi, and A. Sumarudin. "Implementasi Sistem Manajemen Log untuk Penanggulangan Serangan Server dengan SIEM." IKRA-ITH Informatika : Jurnal Komputer dan Informatika 8, no. 3 (2024): 23–30. http://dx.doi.org/10.37817/ikraith-informatika.v8i3.4359.
Full textFan, Zhijie, Bo Yang, Jing Peng, Bingsen Pei, Changsong Zheng, and Xin Li. "Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection." International Journal of Information Security and Privacy 18, no. 1 (2024): 1–26. http://dx.doi.org/10.4018/ijisp.349569.
Full textMalec, Przemysław, and Anna Piwowar. "Detecting Security Violations Based on Multilayered Event Log Processing." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 30–36. http://dx.doi.org/10.26636/jtit.2015.4.981.
Full textZawoad, Shams, Marjan Mernik, and Ragib Hasan. "Towards building a forensics aware language for secure logging." Computer Science and Information Systems 11, no. 4 (2014): 1291–314. http://dx.doi.org/10.2298/csis131201051z.
Full textSingh, Sweta, and Prashant Shukla. "Log File Compression and its Security in Web Server." International Journal of Computer Applications 151, no. 3 (2016): 32–36. http://dx.doi.org/10.5120/ijca2016911715.
Full textKahonge, Andrew Mwaura, William Okello-Odongo, Evans K. Miriti, and Elisha Abade. "Web Security and Log Management: An Application Centric Perspective." Journal of Information Security 04, no. 03 (2013): 138–43. http://dx.doi.org/10.4236/jis.2013.43016.
Full textPathak, Purvi, Kumar Rangasamy, and Theophilus Selvaraj. "Security Analytics and Benchmarking Log Aggregation in the Cloud." EAI Endorsed Transactions on Cloud Systems 3, no. 11 (2018): 154464. http://dx.doi.org/10.4108/eai.11-4-2018.154464.
Full textHåstad, Johan, and Mats Nåslund. "The security of all RSA and discrete log bits." Journal of the ACM 51, no. 2 (2004): 187–230. http://dx.doi.org/10.1145/972639.972642.
Full textForte, Dario. "The importance of log files in security incident prevention." Network Security 2009, no. 7 (2009): 18–20. http://dx.doi.org/10.1016/s1353-4858(09)70090-x.
Full textForte, Dario, and Richard Power. "Guaranteeing convergence in security management with consolidated log management." Computer Fraud & Security 2008, no. 7 (2008): 5–6. http://dx.doi.org/10.1016/s1361-3723(08)70110-6.
Full textLuo, Zhengping, Zhe Qu, Tung Nguyen, Hui Zeng, and Zhuo Lu. "Security of HPC Systems: From a Log-analyzing Perspective." ICST Transactions on Security and Safety 6, no. 21 (2019): 163134. http://dx.doi.org/10.4108/eai.19-8-2019.163134.
Full textSidorova, Diana N., and Evgeniy N. Pivkin. "Algorithms and methods of data clustering in the analysis of information security event logs." Digital technology security, no. 1 (March 30, 2022): 41–60. http://dx.doi.org/10.17212/2782-2230-2022-1-41-60.
Full textCopstein, Rafael, Egil Karlsen, Jeff Schwartzentruber, Nur Zincir-Heywood, and Malcolm Heywood. "Exploring syntactical features for anomaly detection in application logs." it - Information Technology 64, no. 1-2 (2022): 15–27. http://dx.doi.org/10.1515/itit-2021-0064.
Full textChae, Hyun Tak, and Sang-Jin Lee. "Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)." Journal of the Korea Institute of Information Security and Cryptology 24, no. 5 (2014): 961–68. http://dx.doi.org/10.13089/jkiisc.2014.24.5.961.
Full textG.L.D., Maduranga. "Network Security Enhancement through Effective Log Analysis using Elk for Small and Medium-Sized Business Environments." Journal of Network Security and Data Mining 4, no. 1 (2021): 1–7. https://doi.org/10.5281/zenodo.4700045.
Full textLakshmi Narasimha, Lakshmi Narasimha. "Logs-The First Pillar of Observability." International Journal of Multidisciplinary Research and Growth Evaluation. 2, no. 2 (2021): 302–6. https://doi.org/10.54660/.ijmrge.2021.2.2.302-306.
Full textAzizi, Yassine, Mostafa Azizi, and Mohamed Elboukhari. "Log Data Integrity Solution based on Blockchain Technology and IPFS." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 15 (2022): 4–15. http://dx.doi.org/10.3991/ijim.v16i15.31713.
Full textS. Madhumitha and Ms. N. Vaishnavi. "Banking Security System Using Cyber Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1184–90. https://doi.org/10.32628/cseit25112451.
Full textMadan, Mohan, Malviya Aadarsh, and Mishra Anuranjan. "Importance of Security in Big Data Log Files on Cloud." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 1 (2021): 51–54. https://doi.org/10.35940/ijeat.A3138.1011121.
Full textNegi, Shalabh, and Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.
Full textZhong, Ming, Yajin Zhou, and Gang Chen. "A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network." Security and Communication Networks 2021 (March 23, 2021): 1–13. http://dx.doi.org/10.1155/2021/5542543.
Full textJin, Jingquan, and Xin Lin. "Web Log Analysis and Security Assessment Method Based on Data Mining." Computational Intelligence and Neuroscience 2022 (August 25, 2022): 1–9. http://dx.doi.org/10.1155/2022/8485014.
Full textMohan, Madan, Aadarsh Malviya, and Anuranjan Mishra. "Importance of Security in Big Data Log Files on Cloud." International Journal of Engineering and Advanced Technology 11, no. 1 (2021): 51–54. http://dx.doi.org/10.35940/ijeat.a3138.1011121.
Full text