{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T06:53:08Z","timestamp":1773903188408,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T00:00:00Z","timestamp":1617580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,5]]},"DOI":"10.1145\/3460620.3460747","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T10:33:05Z","timestamp":1622802785000},"page":"147-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["SIEM Architecture for the Internet of Things and Smart City"],"prefix":"10.1145","author":[{"given":"Abdalrahman","family":"Hwoij","sequence":"first","affiliation":[{"name":"Princess Sumaya University for Technology, Jordan"}]},{"given":"As'har","family":"Khamaiseh","sequence":"additional","affiliation":[{"name":"Princess Sumaya University for Technology, Jordan"}]},{"given":"Mohammad","family":"Ababneh","sequence":"additional","affiliation":[{"name":"Princess Sumaya University for Technology, Jordan"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCCAIS.2014.6916651"},{"key":"e_1_3_2_1_2_1","unstructured":"\"GMDIT News Viewer\" Gmdit.com 2019. Retrieved May 17 2019 from https:\/\/www.gmdit.com\/NewsView.aspx?ID=9IfB2Axzeew"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228696"},{"key":"e_1_3_2_1_4_1","unstructured":"\"What is SIEM?\" \u00a0Forcepoint 2019. Retrieved May 17 2019 from https:\/\/www.forcepoint.com\/cyber-edu\/siem ."},{"key":"e_1_3_2_1_5_1","unstructured":"R. Dalinina \"Introduction to Correlation\" \u00a0Datascience.com 2019. Retrieved 17- May 17 2019 from https:\/\/www.datascience.com\/blog\/introduction-to-correlation-learn-data-science-tutorials."},{"key":"e_1_3_2_1_6_1","unstructured":"\"How SIEM Correlation Rules Work\" \u00a0Alienvault.com 2019. Retrieved May 17 2019 from https:\/\/www.alienvault.com\/blogs\/security-essentials\/how-siem-correlation-rules-work."},{"key":"e_1_3_2_1_7_1","volume-title":"Rule generation for TCP SYN ood attack in SIEM Environment. Procedia computer science 115","author":"Raja M Siva Niranjan","year":"2017","unstructured":"M Siva Niranjan Raja and AR Vasudevan. 2017. Rule generation for TCP SYN ood attack in SIEM Environment. Procedia computer science 115 (2017), 580-587."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2016.53"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCO.2016.7831327"},{"key":"e_1_3_2_1_10_1","volume-title":"2018 2nd International Conference on Telematics and Future Generation Networks (TAFGEN). IEEE, 149-154","author":"Awang Lah Airull Azizi","year":"2018","unstructured":"Airull Azizi Awang Lah, Rudzi-datul Akmam Dziyauddin, and Marwan Hadri Azmi. 2018. Proposed frame-work for network lateral movement detection based on user risk scoring in siem. In 2018 2nd International Conference on Telematics and Future Generation Networks (TAFGEN). IEEE, 149-154."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2947626.2947639"},{"key":"e_1_3_2_1_12_1","volume-title":"An approach to developing the SIEM system for the Internet of Things. Automatic control and computer sciences 50, 8","author":"Lavrova Daria S","year":"2016","unstructured":"Daria S Lavrova. 2016. An approach to developing the SIEM system for the Internet of Things. Automatic control and computer sciences 50, 8 (2016), 673{681."},{"key":"e_1_3_2_1_13_1","unstructured":"\"IoT Explained - How Does an IoT System Actually Work?\" Leverege.com 2019. Retrieved May 18 2019 from https:\/\/www.leverege.com\/blogpost\/iot-explained-how-does-an-iot-system-actually-work."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Lavrova D. Pechenkin A. & Gluhov V. Applying correlation analysis methods to control flow violation detection in the internet of things. Automatic Control and Computer Science 49 8(2015) 735-740.","DOI":"10.3103\/S0146411615080283"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.391"},{"key":"e_1_3_2_1_16_1","volume-title":"Splunk, 2019","author":"Universal Download Splunk","year":"2019","unstructured":"\"Download Splunk Universal Forwarder for secure remote data collection\", Splunk, 2019. Retrieved May 11, 2019 from https:\/\/www.splunk.com\/en_us\/download\/universal-forwarder.html."},{"key":"e_1_3_2_1_17_1","unstructured":"\"The universal forwarder - Splunk Documentation\" Docs.splunk.com 2019. Retrieved May 18 2019 from https:\/\/docs.splunk.com\/Documentation\/Forwarder\/7.2.6\/Forwarder\/Abouttheuniversalforwarder"},{"key":"e_1_3_2_1_18_1","unstructured":"\"Splexicon:Heavyforwarder - Splunk Documentation\" Docs.splunk.com 2019. Retrieved May 18 2019 from https:\/\/docs.splunk.com\/Splexicon:Heavyforwarder."},{"key":"e_1_3_2_1_19_1","unstructured":"\"Splexicon:Indexer - Splunk Documentation\" Docs.splunk.com 2019. Retrieved May 18 2019 from https:\/\/docs.splunk.com\/Splexicon:Indexer."},{"key":"e_1_3_2_1_20_1","volume-title":"Edureka, 2019","author":"Architecture Splunk","year":"2019","unstructured":"\"Splunk Architecture: Forwarder, Indexer & Search Head Tutorial | Edureka\", Edureka, 2019. Retrieved May 18, 2019 from https:\/\/www.edureka.co\/blog\/splunk-architecture\/."},{"key":"e_1_3_2_1_21_1","unstructured":"\"Deployment server architecture - Splunk Documentation\" \u00a0Docs.splunk.com 2019. Retrieved May 18 2019 from https:\/\/docs.splunk.com\/Documentation\/Splunk\/7.2.6\/Updating\/Deploymentserverarchitecture.\u00a0"},{"key":"e_1_3_2_1_22_1","volume-title":"What does an intelligent Security Operations Center (SOC) look like? | Learn","year":"2019","unstructured":"\"Tutorial: What does an intelligent Security Operations Center (SOC) look like? | Learn\", TechBeacon, 2019. Retrieved May 18, 2019 from https:\/\/learn.techbeacon.com\/units\/what-are-siem-user-roles."}],"event":{"name":"DATA'21: International Conference on Data Science, E-learning and Information Systems 2021","location":"Ma'an Jordan","acronym":"DATA'21"},"container-title":["International Conference on Data Science, E-learning and Information Systems 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460747","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460620.3460747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:31:30Z","timestamp":1757543490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,5]]},"references-count":22,"alternative-id":["10.1145\/3460620.3460747","10.1145\/3460620"],"URL":"https:\/\/doi.org\/10.1145\/3460620.3460747","relation":{},"subject":[],"published":{"date-parts":[[2021,4,5]]},"assertion":[{"value":"2021-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}