[1] | González-Granadillo, G., González-Zarzosa, S., & Diaz, R. (2021). Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures. Sensors, 21(14), 4759. |
|
[2] | National Institute of Standards and Technology. (2015). Guide to industrial control systems (ICS) security- NIST special publication 800-82, revision 2. https:// nvlpubs.nist.gov/ nistpubs/ SpecialPublications/ NIST.SP.800-82r2.pdf. |
|
[3] | Bowman, B., & Huang, H. H. (2021). Towards next-generation cybersecurity with graph ai. ACM SIGOPS Operating Systems Review, 55(1), 61-67. |
|
[4] | Mtsweni, J., & Mutemwa, M. (2019, July). Technical guidelines for evaluating and selecting data sources for cybersecurity threat intelligence. In Proceedings of the ECCWS 2019 18th European Conference on Cyber Warfare and Security (pp. 305-313). |
|
[5] | Biddle, S. (2017). Why SIEM solutions are essential to securing healthcare networks. Fortinet Article. |
|
[6] | O’Dowd, E. (2016). How SIEM solutions work to secure health IT infrastructure. HIT Infrastructure, Xtelligent Healthcare Media Report. |
|
[7] | Hollister, A. (2021). Similarities and differences between XDR and SIEM. Forbes Technology Council Post. |
|
[8] | Serckumecka, A., Medeiros, I., Ferreira, B., & Bessani, A. (2019). A cost-effective cloud event archival for SIEMs. In 2019 38th International Symposium on Reliable Distributed Systems Workshops (SRDSW) (pp. 31-36). IEEE. |
|
[9] | Tankard, C. (2019). Goodbye SIEM, Hello SOARX. Network Security. |
|
[10] | Vazao, A., Santos, L., Oliveira, A., & Rabadao, C. (2021, June). A GDPR compliant siem solution. In European Conference on Cyber Warfare and Security (pp. 440-XIV). Academic Conferences International Limited. |
|
[11] | Voigt, P., & Von dem Bussche, A. (2017). The eu general data protection regulation (GDPR). A Practical Guide, 1st Ed., Cham: Springer International Publishing, 10(3152676), 10-5555. |
|
[12] | Ajmal, A. B., Shah, M. A., Maple, C., Asghar, M. N., & Islam, S. U. (2021). Offensive security: Towards proactive threat hunting via adversary emulation. IEEE Access, 9, 126023-126033. |
|
[13] | DalleMule, L., & Davenport, T. H. (2017). What’s your data strategy. Harvard business review, 95(3), 112-121. |
|
[14] | Waltz, E. (2000, June). Data fusion in offensive and defensive information operations. In NSSDF Symposium. |
|
[15] | Samtani, S., Kantarcioglu, M., & Chen, H. (2020). Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap. ACM Transactions on Management Information Systems (TMIS), 11(4), 1-19. |
|