JOURNAL ARTICLE

Security Event Analysis through Correlation

Anton Chuvakin

Year: 2004 Journal:   Information Systems Security Vol: 13 (2)Pages: 13-18   Publisher: Taylor & Francis

Abstract

Abstract The security spending survey by Information Security(http://www.infosecuritymag.com/2003/may/coverstory.pdf) and recent research by Forrester indicate that deployment rates of many security technologies will soar in the next three years. According to some estimates, security budgets (and thus technology purchases) will double by 2006.

Keywords:
Soar Software deployment Computer science Computer security Event (particle physics) Security information and event management Information security Security analysis Information security audit Cloud computing security Security service Cloud computing Network security policy

Metrics

12
Cited By
3.94
FWCI (Field Weighted Citation Impact)
0
Refs
0.94
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
© 2026 ScienceGate Book Chapters — All rights reserved.