The Log4Audit framework, I developed in my dissertation creates a centralized processing engine that captures necessary events from an application log, analyzes them and provides real time monitoring. Based on design research methodology, I find the motivation in the scarcity of studies that utilize large volumes of information contained in system and application logs. The purpose of my work is to provide detailed view of Log4Audit framework I developed and illustrate its capabilities in anomaly detection and management’s assertions guidance. My dissertation follows the design research methodology. The framework is the first attempt to alleviate the problems of alienated applications employed by an organization to perform different business...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
Logs have been widely adopted in software system development and maintenance because of the rich sys...
Checking the execution behaviour of continuous running software systems is a critical task, to valid...
Traceability is one of the crucial features of a software application. Logging is considered one of ...
Software rarely comes without maintenance after it is released. There can be bugs not captured in de...
Modern software development and operations rely on monitoring to understand how systems behave in pr...
Process mining refers to analyzing business processes using the event log information from the accou...
As log files increase in size, it becomes increasingly difficult to manually detect errors within th...
dissertationSoftware developers often record critical system events and system status into log files...
Retrospective security has become increasingly important to the theory and practice of cyber securit...
While logging events is becoming increasingly common in computing, in communication and in collabora...
Many applications within the Flexyz network generate a lot of log data. This data used to be difficu...
Process mining has been introduced as an auditing tool to aid auditors in examining the business pro...
Applying process mining as an analytical procedure is a relatively young stream of thought in auditi...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
Logs have been widely adopted in software system development and maintenance because of the rich sys...
Checking the execution behaviour of continuous running software systems is a critical task, to valid...
Traceability is one of the crucial features of a software application. Logging is considered one of ...
Software rarely comes without maintenance after it is released. There can be bugs not captured in de...
Modern software development and operations rely on monitoring to understand how systems behave in pr...
Process mining refers to analyzing business processes using the event log information from the accou...
As log files increase in size, it becomes increasingly difficult to manually detect errors within th...
dissertationSoftware developers often record critical system events and system status into log files...
Retrospective security has become increasingly important to the theory and practice of cyber securit...
While logging events is becoming increasingly common in computing, in communication and in collabora...
Many applications within the Flexyz network generate a lot of log data. This data used to be difficu...
Process mining has been introduced as an auditing tool to aid auditors in examining the business pro...
Applying process mining as an analytical procedure is a relatively young stream of thought in auditi...
Special care should be taken to verify the integrity and to ensure that sensitive data is adequately...
Aeolus is a programming platform that supports the development of secure applica-tions that preserve...
Logs have been widely adopted in software system development and maintenance because of the rich sys...