{"id":"https://openalex.org/W4414133209","doi":"https://doi.org/10.32604/cmc.2025.068509","title":"A Security Operation and Event Management (SOEM) Platform for Critical Infrastructures Protection","display_name":"A Security Operation and Event Management (SOEM) Platform for Critical Infrastructures Protection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414133209","doi":"https://doi.org/10.32604/cmc.2025.068509"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.068509","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068509","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.068509","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060126844","display_name":"Roberto Caviglia","orcid":"https://orcid.org/0000-0003-1483-7242"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Roberto Caviglia","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119594727","display_name":"Daniyar Aliaskharov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daniyar Aliaskharov","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066866787","display_name":"Alessio Aceti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alessio Aceti","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005632682","display_name":"Mila Dalla Preda","orcid":"https://orcid.org/0000-0003-2761-4347"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mila Dalla Preda","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017443119","display_name":"P. Girdinio","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Paola Girdinio","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5078021776","display_name":"Giovanni Battista Gaggero","orcid":"https://orcid.org/0000-0001-6404-2451"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Giovanni Battista Gaggero","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5060126844"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.4558,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86523186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"85","issue":"3","first_page":"5327","last_page":"5340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9545999765396118,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9545999765396118,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9506999850273132,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9283999800682068,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5774000287055969},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.48559999465942383},{"id":"https://openalex.org/keywords/general-partnership","display_name":"General partnership","score":0.44609999656677246},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.44519999623298645},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4171999990940094},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41350001096725464},{"id":"https://openalex.org/keywords/incident-management","display_name":"Incident management","score":0.3953000009059906},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.38769999146461487},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.37860000133514404}],"concepts":[{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5774000287055969},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.48559999465942383},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.475600004196167},{"id":"https://openalex.org/C71750763","wikidata":"https://www.wikidata.org/wiki/Q646164","display_name":"General partnership","level":2,"score":0.44609999656677246},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.44519999623298645},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.43720000982284546},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4171999990940094},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41350001096725464},{"id":"https://openalex.org/C2780952636","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident management","level":2,"score":0.3953000009059906},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.38769999146461487},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.37860000133514404},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3763999938964844},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3720000088214874},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.335099995136261},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.33169999718666077},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3165000081062317},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.31209999322891235},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.310699999332428},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2904999852180481},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.2847000062465668},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.27970001101493835},{"id":"https://openalex.org/C62555980","wikidata":"https://www.wikidata.org/wiki/Q1460420","display_name":"Emergency management","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C198783460","wikidata":"https://www.wikidata.org/wiki/Q629173","display_name":"Management system","level":2,"score":0.27239999175071716},{"id":"https://openalex.org/C167740415","wikidata":"https://www.wikidata.org/wiki/Q2876213","display_name":"Aerospace","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C123606473","wikidata":"https://www.wikidata.org/wiki/Q907918","display_name":"Complex event processing","level":3,"score":0.2639000117778778},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.25859999656677246},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2563999891281128},{"id":"https://openalex.org/C2778857364","wikidata":"https://www.wikidata.org/wiki/Q974850","display_name":"Missile","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.32604/cmc.2025.068509","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068509","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},{"id":"pmh:oai:unige.iris.cineca.it:11567/1273100","is_oa":false,"landing_page_url":"https://hdl.handle.net/11567/1273100","pdf_url":null,"source":{"id":"https://openalex.org/S4377196291","display_name":"CINECA IRIS Institutial Research Information System (University of Genoa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I83816512","host_organization_name":"University of Genoa","host_organization_lineage":["https://openalex.org/I83816512"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.068509","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068509","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2625194215","https://openalex.org/W2033321439","https://openalex.org/W4294203126","https://openalex.org/W2054661273","https://openalex.org/W3166413122","https://openalex.org/W2274277230","https://openalex.org/W4313467051","https://openalex.org/W2777092691","https://openalex.org/W2297009891"],"abstract_inverted_index":{"Industrial":[0],"Control":[1],"Systems":[2],"(ICS)":[3],"in":[4,51,110,123],"Operational":[5],"Technology":[6],"(OT)":[7],"environments":[8],"face":[9],"unique":[10],"cybersecurity":[11],"challenges":[12],"due":[13],"to":[14,45,79,129,132],"legacy":[15],"systems,":[16,66],"critical":[17],"operational":[18],"needs,":[19],"and":[20,37,63,75,83,106,115,159],"incompatibility":[21],"with":[22,112,136],"standard":[23],"IT":[24],"security":[25],"practices.":[26],"To":[27],"address":[28],"these":[29],"challenges,":[30],"this":[31],"paper":[32],"presents":[33],"the":[34,71,95,100,130,139,153,160],"Security":[35,47],"Operation":[36],"Event":[38],"Management":[39],"(SOEM)":[40],"platform,":[41],"a":[42,124],"software":[43],"designed":[44],"support":[46],"Operations":[48],"Centers":[49],"(SOCs)":[50],"reaching":[52],"full":[53],"visibility":[54],"of":[55,163],"OT":[56],"environments.":[57],"SOEM":[58],"integrates":[59],"diverse":[60],"log":[61],"sources":[62],"intrusion":[64],"detection":[65],"including":[67],"logs":[68],"generated":[69],"by":[70],"control":[72],"system":[73],"itself":[74],"additional":[76],"on-the-shelf":[77],"products,":[78],"enhance":[80],"situational":[81],"awareness":[82],"enable":[84],"rapid":[85],"incident":[86],"response.":[87],"The":[88,118],"pilot":[89,126],"project":[90,97],"was":[91],"carried":[92],"out":[93],"within":[94],"funded":[96],"SOC-OT-IGE":[98],"from":[99],"\u201cCentro":[101],"di":[102],"Competenza":[103],"Start":[104],"4.0\u201d":[105],"is":[107],"being":[108],"developed":[109],"partnership":[111],"Ansaldo":[113],"Energia":[114],"HWG":[116],"Sababa.":[117],"validation":[119],"has":[120],"been":[121],"conducted":[122],"real-world":[125],"project.":[127],"Thanks":[128],"mapping":[131],"requirements":[133],"for":[134],"compliance":[135],"IEC":[137],"62443,":[138],"platform":[140],"demonstrates":[141],"its":[142],"effectiveness":[143],"through":[144],"defined":[145],"key":[146],"performance":[147],"indicators":[148],"(KPIs).":[149],"This":[150],"work":[151],"bridges":[152],"gap":[154],"between":[155],"IT-centric":[156],"SOC":[157],"methodologies":[158],"specialized":[161],"needs":[162],"industrial":[164],"cybersecurity.":[165]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
