{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:24:44Z","timestamp":1730276684888,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isspit.2014.7300604","type":"proceedings-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T18:19:44Z","timestamp":1445883584000},"page":"000301-000306","source":"Crossref","is-referenced-by-count":2,"title":["A methodology for building a log management infrastructure"],"prefix":"10.1109","author":[{"given":"Vasileios","family":"Anastopoulos","sequence":"first","affiliation":[]},{"given":"Sokratis K.","family":"Katsikas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Center for Computational Analysis of Social and Organizational Systems","year":"0","key":"ref38"},{"journal-title":"Network Operation Center","year":"0","key":"ref33"},{"journal-title":"Scalability in Log Management (Research 010-021609-02)","year":"0","key":"ref32"},{"journal-title":"Network Time Protocol Best Practices White Paper(DocumentID 19643)","year":"2008","key":"ref31"},{"journal-title":"IEEE IEEE","first-page":"1588","year":"2008","key":"ref30"},{"journal-title":"Rsyslog project","year":"0","key":"ref37"},{"journal-title":"Extreme Networks","year":"0","key":"ref36"},{"journal-title":"Juniper Networks","year":"0","key":"ref35"},{"journal-title":"Cisco","year":"0","key":"ref34"},{"key":"ref10","article-title":"The Key Player Problem","author":"borgatti","year":"2003","journal-title":"Dynamic Social Network Modeling and Analysis"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7084-x"},{"journal-title":"A Guide to Security Metrics","year":"2006","key":"ref12"},{"journal-title":"Performance Measurement Guide for Information Security NIST SP","first-page":"800","year":"2008","key":"ref13"},{"journal-title":"The Critical Security Controls Twenty Critical Security Controls for Effective Cyber Defense-Versions 4 1","year":"0","key":"ref14"},{"journal-title":"The 6 Categories of Critical Log Information version 3 01","year":"0","key":"ref15"},{"year":"2012","key":"ref16","first-page":"800"},{"journal-title":"Logs-The Foundation of Good Security Monitoring","year":"2011","author":"hutcheson","key":"ref17"},{"article-title":"Security Information and Event Management (SIEM) Implementation","year":"2011","author":"miller","key":"ref18"},{"journal-title":"RFC5424 The Syslog Protocol IETF RFC5424","year":"2009","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"journal-title":"Building an Infrastructure That Enables Log Management Best Practices","year":"0","key":"ref4"},{"article-title":"Annual Tools\/Computational Approaches\/Methods Conference","year":"2008","author":"frantz","key":"ref27"},{"journal-title":"Best Practices in Log Management for Security and Compliance","year":"2007","key":"ref3"},{"article-title":"Effective Use Case Modeling for Security Information and Event Management","year":"2009","author":"frye","key":"ref6"},{"key":"ref29","article-title":"RFC5905 Network Time Protocol Version","volume":"4","year":"2010","journal-title":"Protocol and Algorithms Specification IETF RFC5905"},{"journal-title":"Log Management SIMetry A Step by Step Guide to Selecting the Correct Solution","year":"2007","author":"beechey","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"journal-title":"SIEM in the Cloud Cost-effective Solutions for Taking Control of Data Overload and Scaling Security","year":"0","key":"ref7"},{"year":"2006","key":"ref2","first-page":"800"},{"article-title":"Exploratory Network Analysis with Pajek","year":"2005","author":"noou","key":"ref9"},{"year":"2012","key":"ref1","article-title":"Log and Event Management Survey Results (SANS Eighth Annual)"},{"journal-title":"On the (un)reliability of plain tcp syslog","year":"2008","author":"gerhards","key":"ref20"},{"journal-title":"Cisco Building Scalable Syslog Management Solutions","year":"2011","key":"ref22"},{"journal-title":"RFC3195 Reliable Delivery for syslog IETF RFC3195","year":"2001","key":"ref21"},{"journal-title":"Centralized Logging with rsyslog","year":"2009","author":"matulis","key":"ref24"},{"journal-title":"Benchmarking Security Information events Management (SIEM)","year":"2009","author":"butler","key":"ref23"},{"key":"ref26","article-title":"Centrality in Social Networks I","author":"freeman","year":"1979","journal-title":"Conceptual Clarification"},{"journal-title":"CMU-ISRI-04-10","year":"2004","key":"ref25"}],"event":{"name":"2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","start":{"date-parts":[[2014,12,15]]},"location":"Noida, India","end":{"date-parts":[[2014,12,17]]}},"container-title":["2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7277353\/7300553\/07300604.pdf?arnumber=7300604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:17:53Z","timestamp":1490393873000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7300604\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/isspit.2014.7300604","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}