Security log

A security log is used to track security-related information on a computer system. Examples include: * Windows Security Log * Internet Connection… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Enterprises today are facing an increasing number of criminal threats ranging from financially motivated and opportunistic… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2014
2014
In this paper, we propose a new security log management scheme for smart surveillance in a multi-camera environment. Basically… (More)
Is this relevant?
2012
2012
Abstract With network's growth and popularization, network security experts are facing bigger and bigger network security log… (More)
Is this relevant?
2007
2007
The Windows Server 2003 Security Log Revealed was writin by Randy Franklin Smith the recognized expert on the Windows Security… (More)
Is this relevant?
2006
2006
The National Institute of Standards and Technology (NIST) developed this doocument in furtherance of its statutory… (More)
Is this relevant?
2006
2006
As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log files… (More)
Is this relevant?
2006
2006
Introduction to Security Log Management The Top 10 Security Logs IDS Reporting Firewall Reporting Systems and Network Device… (More)
Is this relevant?
2006
2006
When it comes to the security of the IT system, event logs play a crucial role. Today, many applications, operating systems… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
1974
Highly Cited
1974
The protection of time sharing systems from unauthorized users is often achieved by the use of passwords. By using one-way… (More)
Is this relevant?