{"id":"https://openalex.org/W4383221477","doi":"https://doi.org/10.1145/3579856.3592830","title":"POSTER: Security Logs Graph Analytics for Industry Network System","display_name":"POSTER: Security Logs Graph Analytics for Industry Network System","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221477","doi":"https://doi.org/10.1145/3579856.3592830"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3592830","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3579856.3592830","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3579856.3592830","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3579856.3592830","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101474988","display_name":"Qiaoran Meng","orcid":"https://orcid.org/0009-0002-7758-932X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Qiaoran Meng","raw_affiliation_strings":["National University of Singapore, Singapore"],"raw_orcid":"https://orcid.org/0009-0002-7758-932X","affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065755186","display_name":"Nay Oo","orcid":"https://orcid.org/0009-0006-3414-4696"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nay Oo","raw_affiliation_strings":["NCS Cyber Special Ops-R&amp;D, Singapore"],"raw_orcid":"https://orcid.org/0009-0006-3414-4696","affiliations":[{"raw_affiliation_string":"NCS Cyber Special Ops-R&amp;D, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016340326","display_name":"Hoon Wei Lim","orcid":"https://orcid.org/0000-0002-7830-3007"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hoon Wei Lim","raw_affiliation_strings":["NCS Cyber Special Ops-R&amp;D, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-7830-3007","affiliations":[{"raw_affiliation_string":"NCS Cyber Special Ops-R&amp;D, Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041189303","display_name":"Biplab Sikdar","orcid":"https://orcid.org/0000-0002-0084-4647"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Biplab Sikdar","raw_affiliation_strings":["National University of Singapore, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-0084-4647","affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101474988"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08012695,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1043","last_page":"1045"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7495635151863098},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.7008501887321472},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.6513795852661133},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5783714056015015},{"id":"https://openalex.org/keywords/judgement","display_name":"Judgement","score":0.577605664730072},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.48512065410614014},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4832333028316498},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.4149625301361084},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4090999960899353},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1548466682434082},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.126932293176651},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09978750348091125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7495635151863098},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.7008501887321472},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.6513795852661133},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5783714056015015},{"id":"https://openalex.org/C2776548248","wikidata":"https://www.wikidata.org/wiki/Q12621536","display_name":"Judgement","level":2,"score":0.577605664730072},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.48512065410614014},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4832333028316498},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.4149625301361084},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4090999960899353},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1548466682434082},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.126932293176651},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09978750348091125},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579856.3592830","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3579856.3592830","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3579856.3592830","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3579856.3592830","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3579856.3592830","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3579856.3592830","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4383221477.pdf","grobid_xml":"https://content.openalex.org/works/W4383221477.grobid-xml"},"referenced_works_count":4,"referenced_works":["https://openalex.org/W2526931032","https://openalex.org/W2799354808","https://openalex.org/W2902825235","https://openalex.org/W3201894803"],"related_works":["https://openalex.org/W2388687352","https://openalex.org/W2886802431","https://openalex.org/W4388216822","https://openalex.org/W1761762290","https://openalex.org/W2370187191","https://openalex.org/W4387575966","https://openalex.org/W1990162851","https://openalex.org/W2384262901","https://openalex.org/W2463183163","https://openalex.org/W2019038080"],"abstract_inverted_index":{"As":[0],"Information":[1],"Technology":[2],"(IT)":[3],"infrastructures":[4],"have":[5,19],"become":[6],"increasingly":[7],"complex":[8],"to":[9,82,93],"secure":[10],"against":[11],"accelerating":[12],"cyber":[13],"threats,":[14],"current":[15],"threat":[16],"detection":[17],"approaches":[18],"been":[20],"largely":[21],"silos":[22],"in":[23,27,110],"nature;":[24],"security":[25,37,95],"analysts":[26,61],"the":[28,45,56,84,102],"environment":[29],"are":[30],"typically":[31],"bombarded":[32],"with":[33,112],"large":[34],"volume":[35],"of":[36,47,58,86,101],"alerts":[38,92],"that":[39,60],"often":[40],"cause":[41],"severe":[42],"fatigues":[43],"and":[44,66,89,99],"possibility":[46],"judgement":[48],"errors.":[49],"This":[50],"problem":[51,85],"is":[52,108],"further":[53],"exacerbated":[54],"by":[55,116],"number":[57],"false-positives":[59],"may":[62],"waste":[63],"valuable":[64],"time":[65],"resources":[67],"pursuing.":[68],"In":[69],"this":[70],"paper,":[71],"we":[72],"present":[73],"how":[74],"intuitive":[75],"graph-based":[76],"machine":[77],"learning":[78],"can":[79],"be":[80],"used":[81],"address":[83],"alert":[87],"fatigue":[88],"prioritize":[90],"risky":[91],"assist":[94],"analysts.":[96],"The":[97],"rationale":[98],"workflow":[100],"proposed":[103],"Graph":[104],"Analysis":[105],"(GA)":[106],"algorithm":[107],"discussed":[109],"detail,":[111],"its":[113],"effectiveness":[114],"demonstrated":[115],"simulated":[117],"experiments.":[118]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
