{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:42:58Z","timestamp":1725756178654},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/issa.2013.6641054","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:20:04Z","timestamp":1383088804000},"page":"1-7","source":"Crossref","is-referenced-by-count":21,"title":["Classification of Security Operation Centers"],"prefix":"10.1109","author":[{"given":"Pierre","family":"Jacobs","sequence":"first","affiliation":[]},{"given":"Alapan","family":"Arnab","sequence":"additional","affiliation":[]},{"given":"Barry","family":"Irwin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Security Services A SOC Should Provide","year":"2012","author":"del vecchio","key":"19"},{"journal-title":"Measuring and Evaluating the Effectiveness of Information S Ecurity","year":"2007","author":"sajko","key":"17"},{"journal-title":"SECURITY OPERATION CENTER","year":"0","key":"18"},{"journal-title":"Using A Capability Maturity Model to Derive Security Requirements","year":"2003","author":"phillips","key":"15"},{"key":"16","article-title":"How can security be measured?","author":"akridge","year":"2005","journal-title":"Information Systems Audit and Control Association"},{"journal-title":"Software Capability Maturity Model (CMM)","year":"0","key":"13"},{"journal-title":"Security Maturity Levels","year":"2012","key":"14"},{"key":"11","article-title":"Measuring and improving it governance through the balanced scorecard","author":"van grembergen","year":"2005","journal-title":"Information Systems Control Journal"},{"journal-title":"Software Capability Maturity Model (CMM)","year":"0","author":"curtis","key":"12"},{"journal-title":"A SAS\ufffd Framework for Network Security Intelligence","year":"2009","author":"protz","key":"21"},{"journal-title":"How to Build Security Operations Center (SOC)","year":"2007","key":"20"},{"journal-title":"Cisco Networkers","article-title":"Cracking the code for a soc blueprint architecture, requirements, methods and processes and deliverables","year":"2006","key":"22"},{"journal-title":"ISO\/IEC 27001 2005 Information Technology-Security Techniques-Information Security Management Systems-Requirements","year":"2005","key":"23"},{"journal-title":"ITIL\ufffd Glossary and Abbreviations","year":"2011","author":"hanna","key":"24"},{"key":"25","article-title":"People and processes more important than technology in securing the enterprise, according to global survey of 4, 000 information security professionals","author":"chung","year":"2006","journal-title":"3rd Annual (ISC) 2-Sponsored Global Information Security Workforce Study Says Asia-Pacific Offers Attractive Employment Incentives and Opportunities for Information Security Professionals"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1201\/1086.1065898X\/45782.14.6.20060101\/91856.6"},{"key":"2","article-title":"A fundamental and essential look into managed security services","author":"warda","year":"2005","journal-title":"SANS (GSEC) Practical Assignment Version 1 4c-Option"},{"journal-title":"ITIL Process Assessment Framework","year":"2010","author":"macdonald","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CASON.2011.6085959"},{"journal-title":"ISO 27001 Gap Analysis-Case Study","year":"2012","author":"ibrahim al-mayahi","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1201\/1086.1065898X\/45782.14.6.20060101\/91856.6"},{"journal-title":"Security Operation Center Concepts &Implementation","year":"2004","author":"bidou","key":"5"},{"key":"4","article-title":"Incident response and creating the csirt in corporate america","author":"thompson","year":"2001","journal-title":"Sans Institute Infosec Reading Room"},{"journal-title":"COBIT 4 1 Framework","year":"2007","author":"adler","key":"9"},{"key":"8","article-title":"The cobit maturity model in a vendor evaluation case","author":"pederiva","year":"2003","journal-title":"Information Systems Control Journal"}],"event":{"name":"2013 Information Security for South Africa","start":{"date-parts":[[2013,8,14]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621627\/6641027\/06641054.pdf?arnumber=6641054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:20:05Z","timestamp":1490224805000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/issa.2013.6641054","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}