Author:
Dey Alexandre,Totel Eric,Costé Benjamin
Publisher
Springer International Publishing
Reference30 articles.
1. Bertero, C., Roy, M., Sauvanaud, C., Trédan, G.: Experience report: log mining using natural language processing and application to anomaly detection. In: 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE), pp. 351–360. IEEE (2017)
2. Brogi, G., Tong, V.V.T.: TerminAPTor: highlighting advanced persistent threats through information flow tracking. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5. IEEE (2016)
3. de Masson d’Autume, C., Ruder, S., Kong, L., Yogatama, D.: Episodic memory in lifelong language learning. CoRR abs/1906.01076 (2019)
4. Debnath, B., et al.: LogLens: a real-time log analysis system. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1052–1062. IEEE (2018)
5. Lecture Notes in Computer Science;A Dey,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Anomaly Detection Algorithms: Comparative Analysis and Explainability Perspectives;Communications in Computer and Information Science;2023-12-05
2. Anomaly Detection Based on Semi-Supervised Generative Adversarial Networks;2022 2nd International Conference on Algorithms, High Performance Computing and Artificial Intelligence (AHPCAI);2022-10-21