1. Verizonent. (2018). 2018 Data Breach Investigations Report (p. 8). https://www.verizonenterprise.com
2. Miller, D. (2011). Security information and event management (SIEM) implementation. McGraw-Hill.
3. Kavanagh, K. M., & Bussa, T. (2017). Magic quadrant for security information and event management. Gartner, Technical Report.
4. Moukafih, N., Orhanou, G., & Elhajji, S. (2020). Mobile agent-based SIEM for event collection and normalization externalization. Information and Computer Security, 28(1), 15–34.
5. Sapegin, A., Jaeger, D., Azodi, A., Gawron, M., Cheng, F., & Meinel, C. (2013). Hierarchical object log format for normalisation of security events. In 2013 9th international conference on information assurance and security (IAS).