{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T04:23:32Z","timestamp":1775103812157,"version":"3.50.1"},"reference-count":23,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.068509","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T08:47:26Z","timestamp":1757580446000},"page":"5327-5340","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["A Security Operation and Event Management (SOEM) Platform for Critical Infrastructures Protection"],"prefix":"10.32604","volume":"85","author":[{"given":"Roberto","family":"Caviglia","sequence":"first","affiliation":[]},{"given":"Daniyar","family":"Aliaskharov","sequence":"additional","affiliation":[]},{"given":"Alessio","family":"Aceti","sequence":"additional","affiliation":[]},{"given":"Mila","family":"Dalla Preda","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Girdinio","sequence":"additional","affiliation":[]},{"given":"Giovanni Battista","family":"Gaggero","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"4759","DOI":"10.3390\/s21144759","article-title":"Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures","volume":"21","author":"Gonz\u00e1lez-Granadillo","year":"2021","journal-title":"Sensors"},{"key":"ref2","series-title":"10th International Conference on Advanced Computing and Communication Systems (ICACCS); 2024 Mar 14\u201315","first-page":"1980","article-title":"Analysis, trends, and utilization of security information and event management (SIEM) in critical Infrastructures","author":"Sashwin","year":"2024"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"227756","DOI":"10.1109\/ACCESS.2020.3045514","article-title":"Security operations center: a systematic study and open challenges","volume":"8","author":"Vielberth","year":"2020","journal-title":"IEEE Access"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"5107","DOI":"10.3390\/en16135107","article-title":"Strategies for real-time simulation of central solenoid ITER power supply digital twin","volume":"16","author":"Minetti","year":"2023","journal-title":"Energies"},{"key":"ref5","unstructured":"Annex III. ICS security related standards, guidelines and policy documents [Internet]. [cited 2023 Nov 2]. Available from: https:\/\/www.enisa.europa.eu\/publications\/annex-iii."},{"key":"ref6","series-title":"2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA); 2017 Jun 19\u201320","first-page":"1","article-title":"Cybersecurity situational awareness taxonomy","author":"Evesti"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MSP.2014.103","article-title":"The operational role of security information and event management systems","volume":"12","author":"Bhatt","year":"2014","journal-title":"IEEE Secur Priv"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"387","DOI":"10.3390\/jcp1030021","article-title":"An empirical assessment of endpoint detection and response systems against advanced persistent threats attack vectors","volume":"1","author":"Karantzas","year":"2021","journal-title":"J Cybersecur Priv"},{"key":"ref9","series-title":"2021 International Conference on Cyber Warfare and Security (ICCWS); 2021 Feb 25\u201326; Online","first-page":"1","article-title":"Endpoint detection & response: a malware identification solution","author":"Arfeen"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1109\/COMST.2022.3233793","article-title":"Adversarial machine learning for network intrusion detection systems: a comprehensive survey","volume":"25","author":"He","year":"2023","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref11","unstructured":"Gartner glossary terms [Internet]. [cited 2023 Oct 31]. Available from: https:\/\/www.gartner.com\/en\/glossary\/all-terms."},{"key":"ref12","series-title":"2023 International Conference on Electrical, Communication and Computer Engineering (ICECCE); 2023 Dec 30\u201331","first-page":"1","article-title":"Integrating OT data in SIEM platforms: an energy utility perspective","author":"Armellin"},{"key":"ref13","first-page":"1","author":"Subramanian","year":"2020","journal-title":"Practical splunk search processing language: a guide for mastering SPL commands for maximum efficiency and outcome"},{"key":"ref14","author":"Bristow","year":"2021","journal-title":"A sans 2021 survey: OT\/ICS cybersecurity"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MITP.2024.3396356","article-title":"A framework for the deployment of cybersecurity monitoring tools in the industrial environment","volume":"26","author":"Armellin","year":"2024","journal-title":"IT Prof"},{"key":"ref16","series-title":"Proceedings of the 2024 IEEE International Workshop on Technologies for Defense and Security; 2024 Nov 12\u201313","first-page":"160","article-title":"Toward a security operation center for operational technology in industrial networks","author":"Gaggero"},{"key":"ref17","unstructured":"Elastic. The heart of the Elastic Stack [Internet]. [cited 2024 Oct 31]. Available from: https:\/\/www.elastic.co\/elasticsearch."},{"key":"ref18","unstructured":"Elastic. Discover, iterate, and resolve with ES\u2014QL on Kibana [Internet]. [cited 2024 Oct 31]. Available from: https:\/\/www.elastic.co\/kibana."},{"key":"ref19","unstructured":"Radiflow. iSID Visibility, Anomaly Detection [Internet]. [cited 2024 Oct 31]. Available from: https:\/\/www.radiflow.com\/products\/ot-visibility-and-anomaly-detection\/."},{"key":"ref20","unstructured":"Tenable. Tenable one [Internet]. [cited 2024 Oct 31]. Available from: https:\/\/www.tenable.com\/products\/tenable-one."},{"key":"ref21","unstructured":"Txone. EdgeIPS [Internet]. [cited 2024 Oct 31]. Available from: https:\/\/www.txone.com\/products\/network-defense\/edgeips."},{"key":"ref22","unstructured":"Txone. Stellar [Internet]. [cited 2024 Oct 31]. Available from: https:\/\/www.txone.com\/products\/endpoint-protection\/stellar\/."},{"key":"ref23","unstructured":"AIrFIELD Security. WatchField [Internet]. [cited 2024 Oct 31]. Available from: https:\/\/www.airfieldsecurity.it\/en\/solutions\/."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_68509\/TSP_CMC_68509.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:22:53Z","timestamp":1763346173000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64182"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":23,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.068509","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-05-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-26","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}