{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T06:07:19Z","timestamp":1749017239976},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.23919\/mipro55190.2022.9803428","type":"proceedings-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T21:03:21Z","timestamp":1656363801000},"source":"Crossref","is-referenced-by-count":8,"title":["Management and Monitoring Security Events in a Business Organization - SIEM system"],"prefix":"10.23919","author":[{"given":"A.","family":"Skendzic","sequence":"first","affiliation":[{"name":"College for Information Technology &#x2013; VsiTe,Zagreb,Croatia"}]},{"given":"B.","family":"Kovacic","sequence":"additional","affiliation":[{"name":"University of Rijeka,Faculty of Informatics and Digital Technology,Rijeka,Croatia"}]},{"given":"B.","family":"Balon","sequence":"additional","affiliation":[{"name":"College for Information Technology &#x2013; VsiTe,Zagreb,Croatia"}]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"DDOSAttacks - CIS"},{"key":"ref11","year":"0","journal-title":"Botnet networks - CERT"},{"key":"ref12","year":"0","journal-title":"Threat modeling - CIS"},{"key":"ref13","year":"0"},{"key":"ref14","year":"0","journal-title":"SOC and SIEM Systems"},{"key":"ref15","year":"0","journal-title":"Streamlined data integrations drive results that matter"},{"key":"ref16","year":"0"},{"key":"ref17","year":"0"},{"key":"ref18","year":"0","journal-title":"Dissecting Pass The Hash Attack"},{"key":"ref19","year":"0","journal-title":"Threat modeling - CIS"},{"key":"ref4","year":"2020","journal-title":"MUP statistics"},{"key":"ref3","year":"0","journal-title":"State of cybercrime"},{"key":"ref6","year":"0","journal-title":"Security policy"},{"key":"ref5","author":"kova?evi?","year":"2008","journal-title":"Sigurnosna politika Diplomski rad Fakultet Elektrotehnike i Ra?unarstva u Zagrebu"},{"key":"ref8","year":"0","journal-title":"CISCO Security Essentials"},{"key":"ref7","year":"0","journal-title":"National VOUND taxonomy"},{"key":"ref2","year":"0","journal-title":"Network security policy"},{"key":"ref1","year":"0","journal-title":"VOUNDIT Taxonomy"},{"key":"ref9","year":"0","journal-title":"Security policy - CERT"}],"event":{"name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","location":"Opatija, Croatia","start":{"date-parts":[[2022,5,23]]},"end":{"date-parts":[[2022,5,27]]}},"container-title":["2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9803295\/9803050\/09803428.pdf?arnumber=9803428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:41:11Z","timestamp":1659660071000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9803428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":19,"URL":"https:\/\/doi.org\/10.23919\/mipro55190.2022.9803428","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]}}}