{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:27:37Z","timestamp":1759134457840},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_61","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T07:13:45Z","timestamp":1488438825000},"page":"579-585","source":"Crossref","is-referenced-by-count":12,"title":["Analysis of Logs by Using Logstash"],"prefix":"10.1007","author":[{"given":"Sushma","family":"Sanjappa","sequence":"first","affiliation":[]},{"given":"Muzameel","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"61_CR1","unstructured":"The Foundation for Federal Security and Compliance \u201cLog Management\u201d. http:\/\/www.mcafee.com"},{"key":"61_CR2","unstructured":"Dr. Anton Chauvin, The wide guide to log and event management. Int. J. Future Comput. Commun. (2013)"},{"key":"61_CR3","unstructured":"V. Vianello, V. Gulisano, Ricardo, A scalable SIEM systems and applications, in International Conference on Availability, Reliability and Security (2013)"},{"key":"61_CR4","unstructured":"Mahmoud Awad, D.A. Menasce, Logging system for automatic process, in Computer Measurement Group Conference, Sanantonio, TX, Nov 2015"},{"key":"61_CR5","unstructured":"Bernard Jasen, Log analysis by semantic search. Elsevier Inf. Res. (2015)"},{"key":"61_CR6","unstructured":"Sudeheendra, Suhas, Mitesh Patel, Pratik Kumar, On the predictive properties of performance models derived through input-output relationships, in Proceeding of 32nd International Computer Measurement Group Conference (2006)"},{"key":"61_CR7","doi-asserted-by":"crossref","unstructured":"R. Vaarandi, M. Pihelgas, Using security logs for collecting and reporting technical matrix. IEEE Trans. (2014)","DOI":"10.1109\/MILCOM.2014.53"},{"key":"61_CR8","unstructured":"T.M. Vaarandi, Imagining event log clusters, in 2015 11th International Conference Network and Service management (CNSM)"},{"key":"61_CR9","unstructured":"David Swift, Security Log Management Policies for Appraisal and Compliance. SAAN Institute Infosec Reading Room, Nov 2010"},{"key":"61_CR10","unstructured":"Afsaneh Madanis, Classification of security operation centers. IEEE Trans. (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T07:02:05Z","timestamp":1568876525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_61","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}