-
sensitive log data. The
publication was
prepared by
Karen Kent and
Murugiah Souppaya of the
National Institute of
Science and
Technology and
published under...
- Data". PCMag.com. 11 May 2009.
Archived from the
original on 21 June 2017.
Souppaya,
Murugiah P.; Scarfone,
Karen (2013). "Guidelines for
Managing the Security...
- Xiaomi,
Huawei and
Realme Handsets" (PDF).
Retrieved November 16, 2021.
Souppaya,
Murugiah P.; Scarfone,
Karen A. (June 21, 2013).
Guidelines for Managing...
-
Archived from the
original on 12
January 2017.
Retrieved 16
October 2015.
Souppaya, Murugiah; Scarfone,
Karen (22 July 2013).
Guide to
Malware Incident Prevention...
-
Archived from the
original on 18
December 2008.
Karen Scarfone;
Murugiah Souppaya; Matt ****ton (November 2007). "Guide to
storage encryption technologies...
-
threshold can then be
deleted or
archived off-line to save space. Kent, Karen;
Souppaya,
Murugiah (September 2006). "Guide to
Computer Security Management: Recommendations...
- Cybersecurity".
Federal Register. 2021-05-17.
Retrieved 2021-07-28. Kent, Karen;
Souppaya,
Murugiah (13
September 2006). "Guide to
Computer Security Log Management"...
- 3087421. S2CIDÂ 235455870.
Retrieved 20
September 2023. Bartock, Michael;
Souppaya, Murugiah; Savino, Ryan; Knoll, Tim; Shetty, Uttam; Cherfaoui, Mourad;...
-
Ports Are
Under Cyberattack". SonicWall. 16 May 2019. Scarfone, Karen;
Souppaya, Murugiah; Cody, Amanda; Orebaugh, Angela.
Technical Guide to Information...
- SP 800-92r1,
Cybersecurity Log
Management Planning Guide Kent, Karen;
Souppaya,
Murugiah (September 2006).
Guide to
Computer Security Log
Management (Report)...