Author:
Brandao Andre,Georgieva Petia
Publisher
Springer International Publishing
Reference14 articles.
1. Portnoy, L.: Intrusion detection with unlabeled data using clustering. Ph.D. dissertation, Columbia University (2000)
2. Laskov, P., Düssel, P., Schäfer, C., Rieck K.: Learning intrusion detection: supervised or unsupervised? In: International Conference on Image Analysis and Processing, pp. 50–57. Springer (2005)
3. Yen, T.-F., Oprea, A., Onarlioglu, K., Leetham, T., Robertson, W., Juels, A., Kirda, E.L Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 199–208. ACM (2013)
4. Stroeh, K., Madeira, E.R.M., Goldenstein, S.K.: An approach to the correlation of security events based on machine learning techniques. J. Internet Serv. Appl. 4(1), 7 (2013)
5. Li, W.: Automatic log analysis using machine learning: awesome automatic log analysis version 2.0 (2013)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Approach to Prevent DDoS Attack Using Real-Time Access Logs Analysis;Recent Challenges in Intelligent Information and Database Systems;2023