{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:04Z","timestamp":1750221124703,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004263","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado do Rio Grande do Sul","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004263","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297417","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"1365-1372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A hierarchical architectural model for network security exploring situational awareness"],"prefix":"10.1145","author":[{"given":"Ricardo Borges","family":"Almeida","sequence":"first","affiliation":[{"name":"Federal University of Pelotas"}]},{"given":"Victor","family":"Covalski","sequence":"additional","affiliation":[{"name":"Federal University of Pelotas"}]},{"given":"Roger","family":"Machado","sequence":"additional","affiliation":[{"name":"Federal University of Pelotas"}]},{"given":"Di\u00f3rgenes Yuri Leal da","family":"Rosa","sequence":"additional","affiliation":[{"name":"Federal University of Pelotas"}]},{"given":"Adenauer Corr\u00eaa","family":"Yamin","sequence":"additional","affiliation":[{"name":"Federal University of Pelotas"}]},{"given":"Lucas Medeiros","family":"Donato","sequence":"additional","affiliation":[{"name":"De Montfort University"}]},{"given":"Ana Marilza","family":"Pernas","sequence":"additional","affiliation":[{"name":"Federal University of Pelotas"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"volume-title":"Computer Applications and Information Systems (WCCAIS), 2014 World Congress on. 1--6.","author":"Anastasov I.","key":"e_1_3_2_1_1_1","unstructured":"I. Anastasov and D. Davcev. 2014. SIEM implementation for global and distributed environments. In Computer Applications and Information Systems (WCCAIS), 2014 World Congress on. 1--6."},{"key":"e_1_3_2_1_2_1","volume-title":"Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems. In In Proceedings of the IRIS National Symposium on Sensor and Data Fusion. 24--27","author":"Bass Tim","year":"1999","unstructured":"Tim Bass. 1999. Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems. In In Proceedings of the IRIS National Symposium on Sensor and Data Fusion. 24--27."},{"key":"e_1_3_2_1_3_1","volume-title":"The Show Must Go On! The 2017 SANS Incident Response Survey","author":"Bromiley Matt","year":"2017","unstructured":"Matt Bromiley. 2017. The Show Must Go On! The 2017 SANS Incident Response Survey. SANS Institute. InfoSec Reading Room (2017)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.005"},{"key":"e_1_3_2_1_5_1","unstructured":"Elastic. 2018. Beats Platform - Community Beats. https:\/\/www.elastic.co\/guide\/en\/beats\/libbeat\/current\/community-beats.html. {Online; accessed: 24 sep 2018}."},{"key":"e_1_3_2_1_6_1","unstructured":"Elastic. 2018. Logstash - Filter Plugins. https:\/\/www.elastic.co\/guide\/en\/logstash\/current\/filter-plugins.html. {Online; accessed: 24 sep 2018}."},{"key":"e_1_3_2_1_7_1","volume-title":"Network Security Situational Awareness. The International Journal of Computer Science and Communication Security","author":"AHMAD JAKALAN.","year":"2013","unstructured":"AHMAD JAKALAN. 2013. Network Security Situational Awareness. The International Journal of Computer Science and Communication Security (2013)."},{"key":"e_1_3_2_1_8_1","unstructured":"Nikolay Klender. 2015. CorReactive - Event correlation engine with reactive facilities. https:\/\/sourceforge.net\/p\/correactive\/wiki\/FAQ\/. {Online; accessed: 24 sep 2018}."},{"key":"e_1_3_2_1_9_1","unstructured":"Nikolay Klender. 2016. Anomaly Detection with ESA. https:\/\/community.rsa.com\/thread\/187264. {Online; accessed: 02 sep 2018}."},{"key":"e_1_3_2_1_10_1","volume-title":"A Middleware Architecture for Dynamic Adaptation in Ubiquitous Computing. j-jucs 20, 9 (sep","author":"Lopes Jo\u00e3o","year":"2014","unstructured":"Jo\u00e3o Lopes, Rodrigo Souza, Cl\u00e1udio Geyer, Cristiano Costa, Jorge Barbosa, Ana Pernas, and Adenauer Yamin. 2014. A Middleware Architecture for Dynamic Adaptation in Ubiquitous Computing. j-jucs 20, 9 (sep 2014), 1327--1351."},{"key":"e_1_3_2_1_11_1","unstructured":"Gordon Lyon. 2018. Nmap: the Network Mapper - Free Security Scanner. https:\/\/nmap.org\/. {Online; accessed: 24 sep 2018}."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"C. Onwubiko. 2012. Situational Awareness in Computer Network Defense: Principles Methods and Applications: Principles Methods and Applications. Information Science Reference. https:\/\/books.google.com.br\/books?id=neCPNZSx9qoC","DOI":"10.5555\/2222590"},{"key":"e_1_3_2_1_13_1","volume-title":"Context Aware Computing for The Internet of Things: A Survey. CoRR abs\/1305.0982","author":"Perera Charith","year":"2013","unstructured":"Charith Perera, Arkady B. Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2013. Context Aware Computing for The Internet of Things: A Survey. CoRR abs\/1305.0982 (2013). http:\/\/arxiv.org\/abs\/1305.0982"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.001"},{"key":"e_1_3_2_1_15_1","unstructured":"SIMU. 2015. SIMU-project. http:\/\/simu-project.de\/. {Online; accessed: 20 sep 2018}."},{"key":"e_1_3_2_1_16_1","unstructured":"TrendMicro. 2018. OSSEC - Open Source HIDS SECurity. http:\/\/www.ossec.net. {Online; accessed: 24 sep 2018}."},{"key":"e_1_3_2_1_17_1","unstructured":"Verizon. 2012. Data Breach Investigations Report."},{"key":"e_1_3_2_1_18_1","unstructured":"Susana Gonza\u013alez Zarzosa. 2017. DiSIEM: D2.1 In-depth analysis of SIEMs extensibility. (2017)."}],"event":{"name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Limassol Cyprus","acronym":"SAC '19"},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297417","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:15Z","timestamp":1750208535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297417"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":18,"alternative-id":["10.1145\/3297280.3297417","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297417","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}