Author:
Lukashin Alexey,Popov Mikhail,Bolshakov Anatoliy,Nikolashin Yuri
Publisher
Springer International Publishing
Reference9 articles.
1. Brown, A., Tuor, A., Hutchinson, B., Nichols, N.: Recurrent neural network attention mechanisms for interpretable system log anomaly detection. arXiv preprint
arXiv:180304967
(2018)
2. Buczak, A.L., Berman, D.S., Yen, S.W., Watkins, L.A., Duong, L.T., Chavis, J.S.: Using sequential pattern mining for common event format (CEF) cyber data. In: Proceedings of the 12th Annual Conference on Cyber and Information Security Research, p. 2. ACM (2017)
3. Litan, A.: Market guide for user and entity behavior analytics. Gartner (G00276088), 22 September 2015
4. Lukashin, A., Lukashin, A.: Resource scheduler based on multi-agent model and intelligent control system for openstack. In: International Conference on Next Generation Wired/Wireless Networking, pp. 556–566. Springer (2014)
5. Lukashin, A., Zaborovsky, V.S., Kupreenko, S.: Access isolation mechanism based on virtual connection management in cloud systems-how to secure cloud system using high perfomance virtual firewalls. In: ICEIS, vol. 3, pp. 371–375 (2011)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献