Author:
Yue Gang,sun Zhuo,Tian Jianwei,Zhu Hongyu,Zhang Bo
Reference12 articles.
1. Lu, G., Feng, D.: Industrial control system network security situation awareness modeling and algorithm implementation. Control Theory Appl. 33(8), 1054–1060 (2016). https://doi.org/10.7641/CTA.2016.50767
2. Ratner, A.S., Kelly, P.: Anomalies in network traffic. In: IEEE International Conference on Intelligence & Security Informatics. IEEE (2013)
3. Camacho, J., Macia-Fe Rnandez, G., Diaz-Verdejo, J., et al.: Tackling the Big Data 4 vs for anomaly detection. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE (2014)
4. Xu, W., et al.: Detecting large-scale system problems by mining console logs. In: Proceedings of the 27th International Conference on Machine Learning (ICML 2010), 21–24 June, 2010, Haifa, Israel (2010)
5. Therdphapiyanak, J., Piromsopa, K.: Applying Hadoop for log analysis toward distributed IDS. ACM, pp. 1–6(2013)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献