2014
DOI: 10.1515/pik-2014-0009
|View full text |Cite
|
Sign up to set email alerts
|

Security Information and Event Monitoring as a Service: a Survey on Current Concerns and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…This consists of reconfiguring system components in real-time to stop or prevent an intrusion. IM in response to physical environments is mature; however, the increase in virtualization intrusions has become a new target and has led to many questions achieving the same protection in the Cloud (Wenge et al , 2014). While migrating from in-house systems to Cloud, IM does not change much to its implementation.…”
Section: Classificationmentioning
confidence: 99%
See 4 more Smart Citations
“…This consists of reconfiguring system components in real-time to stop or prevent an intrusion. IM in response to physical environments is mature; however, the increase in virtualization intrusions has become a new target and has led to many questions achieving the same protection in the Cloud (Wenge et al , 2014). While migrating from in-house systems to Cloud, IM does not change much to its implementation.…”
Section: Classificationmentioning
confidence: 99%
“…It then makes decisions based on data analysis and ensures the security of systems and the entire Cloud environment (Parkinson et al , 2018). SIEM demonstrates some features such as real-time, availability and reliability while being applied in the Cloud (Rieke et al , 2012; Wenge et al , 2014).…”
Section: Classificationmentioning
confidence: 99%
See 3 more Smart Citations