{"id":"https://openalex.org/W4283662573","doi":"https://doi.org/10.23919/mipro55190.2022.9803428","title":"Management and Monitoring Security Events in a Business Organization - SIEM system","display_name":"Management and Monitoring Security Events in a Business Organization - SIEM system","publication_year":2022,"publication_date":"2022-05-23","ids":{"openalex":"https://openalex.org/W4283662573","doi":"https://doi.org/10.23919/mipro55190.2022.9803428"},"language":"en","primary_location":{"id":"doi:10.23919/mipro55190.2022.9803428","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro55190.2022.9803428","pdf_url":null,"source":{"id":"https://openalex.org/S4363605136","display_name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036133845","display_name":"Aleksandar Skend\u017ei\u0107","orcid":"https://orcid.org/0000-0002-3520-0016"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"A. Skendzic","raw_affiliation_strings":["College for Information Technology &#x2013; VsiTe,Zagreb,Croatia"],"affiliations":[{"raw_affiliation_string":"College for Information Technology &#x2013; VsiTe,Zagreb,Croatia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065318151","display_name":"Bo\u017eidar Kova\u010di\u0107","orcid":"https://orcid.org/0000-0003-2105-9346"},"institutions":[{"id":"https://openalex.org/I154347574","display_name":"University of Rijeka","ror":"https://ror.org/05r8dqr10","country_code":"HR","type":"education","lineage":["https://openalex.org/I154347574"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"B. Kovacic","raw_affiliation_strings":["University of Rijeka,Faculty of Informatics and Digital Technology,Rijeka,Croatia","Faculty of Informatics and Digital Technology, University of Rijeka, Rijeka, Croatia"],"affiliations":[{"raw_affiliation_string":"University of Rijeka,Faculty of Informatics and Digital Technology,Rijeka,Croatia","institution_ids":["https://openalex.org/I154347574"]},{"raw_affiliation_string":"Faculty of Informatics and Digital Technology, University of Rijeka, Rijeka, Croatia","institution_ids":["https://openalex.org/I154347574"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005364107","display_name":"B. Balon","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. Balon","raw_affiliation_strings":["College for Information Technology &#x2013; VsiTe,Zagreb,Croatia"],"affiliations":[{"raw_affiliation_string":"College for Information Technology &#x2013; VsiTe,Zagreb,Croatia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036133845"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3109,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.82932135,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.7885311841964722},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6362614631652832},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5956627726554871},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5241513252258301},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.5183323621749878},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5165111422538757},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5091480612754822},{"id":"https://openalex.org/keywords/certified-information-security-manager","display_name":"Certified Information Security Manager","score":0.4997076988220215},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4794551134109497},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.47046101093292236},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4449795186519623},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.4404866695404053},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4327901601791382},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.41974759101867676},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.1809595227241516},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14892986416816711},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.0843093991279602},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.0686165988445282}],"concepts":[{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.7885311841964722},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6362614631652832},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5956627726554871},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5241513252258301},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.5183323621749878},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5165111422538757},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5091480612754822},{"id":"https://openalex.org/C180823521","wikidata":"https://www.wikidata.org/wiki/Q1662502","display_name":"Certified Information Security Manager","level":5,"score":0.4997076988220215},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4794551134109497},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.47046101093292236},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4449795186519623},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.4404866695404053},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4327901601791382},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.41974759101867676},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.1809595227241516},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14892986416816711},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0843093991279602},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0686165988445282},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/mipro55190.2022.9803428","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro55190.2022.9803428","pdf_url":null,"source":{"id":"https://openalex.org/S4363605136","display_name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4256374004","https://openalex.org/W4310892428","https://openalex.org/W2056794087","https://openalex.org/W2777401565","https://openalex.org/W2362334938","https://openalex.org/W2120971814","https://openalex.org/W1557523735","https://openalex.org/W2033357182","https://openalex.org/W1971960613","https://openalex.org/W2379320583"],"abstract_inverted_index":{"Business":[0],"organizations":[1],"are":[2,32],"increasingly":[3],"facing":[4],"advanced":[5],"threats,":[6],"which":[7],"have":[8,28],"been":[9],"particularly":[10],"affected":[11],"by":[12,79],"new":[13,38],"circumstances":[14],"such":[15,20],"as":[16],"remote":[17],"work.":[18],"In":[19,41],"circumstances,":[21],"members":[22],"of":[23,75],"IT":[24],"security":[25,39,48],"need":[26],"to":[27,34,36,43,55],"appropriate":[29],"systems":[30],"that":[31],"ready":[33],"respond":[35],"this":[37],"threats.":[40],"order":[42],"successfully":[44],"manage":[45],"and":[46,50,65,82],"monitor":[47],"events":[49],"incidents,":[51],"it":[52],"is":[53],"necessary":[54],"establish":[56],"a":[57,92],"Security":[58,63,77],"Operations":[59],"Center":[60],"(SOC)":[61],"or":[62],"Information":[64],"Event":[66],"Management":[67],"(SIEM)":[68],"system.":[69],"This":[70],"paper":[71],"gives":[72],"an":[73],"example":[74],"monitoring":[76],"Events":[78],"Tier":[80,83],"1":[81],"2":[84],"level":[85],"support":[86],"in":[87,91],"installed":[88],"SIEM":[89],"system":[90],"business":[93],"organization.":[94]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
