{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:12:31Z","timestamp":1773925951693,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/isncc.2017.8072035","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:19:48Z","timestamp":1508959188000},"page":"1-6","source":"Crossref","is-referenced-by-count":17,"title":["SIEM selection criteria for an efficient contextual security"],"prefix":"10.1109","author":[{"given":"Moukafih","family":"Nabil","sequence":"first","affiliation":[]},{"given":"Sabir","family":"Soukainat","sequence":"additional","affiliation":[]},{"given":"Abdelmajid","family":"Lakbabi","sequence":"additional","affiliation":[]},{"given":"Orhanou","family":"Ghizlane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"LogPoint","year":"2016","journal-title":"LogPoint Administration Manual"},{"key":"ref11","article-title":"AlienVault","year":"2017","journal-title":"USM Appliance Deployment Guide"},{"key":"ref12","article-title":"Vic Hargrave","year":"2014","journal-title":"Managing your security logs with ElasticSearch"},{"key":"ref13","author":"alexandre","year":"2013","journal-title":"SIEM\/IDS l'union fait-elle la force ?"},{"key":"ref14","article-title":"Transformation de la technologie SIEM en un syst&#x00E9;me d'averstissement proactive des menaces avanc&#x00E9;es","author":"brian","year":"2012","journal-title":"EMC"},{"key":"ref4","author":"rochford","year":"2016","journal-title":"Critical Capabilities for Security Information and Event Management"},{"key":"ref3","author":"rochford","year":"2016","journal-title":"Magic Quadrant for Security Information and Event Management"},{"key":"ref6","article-title":"Verizon","year":"2016","journal-title":"2016 Data Breach Investigations Report Verizon"},{"key":"ref5","article-title":"SANS Institute InfoSec Reading Room","year":"2009","journal-title":"Benchmarking Security Information Event Management"},{"key":"ref8","author":"scarfone","year":"2015","journal-title":"Comparing the best SIEM systems on the market"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.5.37"},{"key":"ref2","article-title":"sKyWIper Analysis Team","volume":"5","year":"2012","journal-title":"SKyWIper (A K A Flame A K A Flamer) A Complex Malware for Targeted Attacks"},{"key":"ref1","article-title":"IDC Security Products","year":"2012","journal-title":"IDC Market Analysis Perspective Worldwide Security Products"},{"key":"ref9","author":"miller","year":"2010","journal-title":"Security Information and Event Management (SIEM) Implementation"}],"event":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Marrakech, Morocco","start":{"date-parts":[[2017,5,16]]},"end":{"date-parts":[[2017,5,18]]}},"container-title":["2017 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8054594\/8071973\/08072035.pdf?arnumber=8072035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T20:45:45Z","timestamp":1512074745000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8072035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isncc.2017.8072035","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}