Author:
Clausen Henry,Grov Gudmund,Sabate Marc,Aspinall David
Publisher
Springer International Publishing
Reference19 articles.
1. M-trends 2015: a view from the front lines. Technical report (2015). https://www2.fireeye.com/rs/fireye/images/rpt-m-trends-2015.pdf
2. Lecture Notes in Computer Science;L Bontemps,2016
3. Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Comput. Commun. 35(7), 772–783 (2012)
4. Chen, W., Grangier, D., Auli, M.: Strategies for training large vocabulary neural language models. arXiv preprint arXiv:1512.04906 (2015)
5. Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285–1298. ACM (2017)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献