Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,351,457 papers from all fields of science
Search
Sign In
Create Free Account
Security operations center
Known as:
SOC
, Security Operation Center
A security operations center (SOC) is a centralized unit that deals with security issues on an organizational and technical level. A SOC within a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Access control
Computer security
Elasticsearch
Information security operations center
Expand
Broader (1)
Security engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Security operation center implementation on OpenStack
Tala Tafazzoli
,
Hossein Gharaee Garakani
International Symposium on Telecommunications
2016
Corpus ID: 11024230
Information security management is a complicated task in cloud environment. Cloud service layers and multi-tenant architecture…
Expand
2016
2016
Taxonomy for Unsecure Big Data Processing in Security Operations Centers
N. Miloslavskaya
,
A. Tolstoy
,
S. Zapechnikov
IEEE 4th International Conference on Future…
2016
Corpus ID: 18856661
While the media constantly describes new attacks, the organizations seriously concerned about their business protection need to…
Expand
2013
2013
Managing high volume data for network attack detection using real-time flow filtering
A. Ghosh
,
Y. Gottlieb
,
+5 authors
Akira Yamada
China Communications
2013
Corpus ID: 24986725
In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume…
Expand
2011
2011
Security Operations Center: Een inrichtingsadvies
K. Rorive
,
Mark Beerends
,
+6 authors
A. Smulders
2011
Corpus ID: 114394725
Een Security Operations Center, kortweg SOC wordt steeds meer omarmd door organisaties voor het beleggen van security taken. Dit…
Expand
2009
2009
Functionality, reliability and adaptability improvements to the OSSIM information security console
J. M. Madrid
,
L. E. Munera
,
+4 authors
Cristian Latorre
IEEE Latin-American Conference on Communications
2009
Corpus ID: 33880135
Security consoles are among the most widely deployed tools for information security management in today's organizations. This…
Expand
2007
2007
Security Operation Center Based on Immune System
Yi Niu
,
Quan Zhang
,
Qilun Zheng
,
Hong Peng
International Conference on Computational…
2007
Corpus ID: 6699429
With the widespread application of large and complicated network, network safety has become an important issue. In this paper, we…
Expand
2007
2007
Software Environment for Simulation and Evaluation of a Security Operation Center
J. Bourgeois
,
Abdoul Karim Ganame
,
Igor Kotenko
,
A. Ulanov
Information Fusion and Geographical Information…
2007
Corpus ID: 40495007
It is somewhat problematic to evaluate the performance of security systems in the Internet due to complexity of these systems and…
Expand
2006
2006
Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center
Abdoul Karim Ganame
,
J. Bourgeois
,
Renaud Bidou
,
F. Spies
International Conference on Security and…
2006
Corpus ID: 4871279
Detecting all kinds of intrusions efficiently requires a global view of the monitored network. We have developed a security…
Expand
2006
2006
Security Operation Center Design Based on D-S Evidence Theory
Xuanzi Hu
,
Cunxi Xie
International Symposium on Mechatronics and its…
2006
Corpus ID: 15099394
With the widespread application of large and complicated network, network safety has become an important issue. In this paper, a…
Expand
2005
2005
Enhancing interoperability of security operation center to heterogeneous intrusion detection systems
A. C. Lin
,
Hsing-Kuo Wong
,
Tzong-Chen Wu
Proceedings 39th Annual International Carnahan…
2005
Corpus ID: 18725796
This study aimed at enhancing the interoperability of a SOC (security operation center) to heterogeneous IDSes (intrusion…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required