Author:
Yue Gang,Sun Zhuo,Tian Jianwei,Zhu Hongyu,Zhang Bo
Publisher
Springer Nature Singapore
Reference12 articles.
1. Lu, G.-H., Feng, D.-Q.: Industrial control system network security situation awareness modeling and algorithm implementation. Control Theor. Appl. 33(8), 1054–1060 (2016). https://doi.org/10.7641/CTA.2016.50767
2. Ratner, A.S., Kelly, P.: Anomalies in network traffic. In: IEEE International Conference on Intelligence & Security Informatics. IEEE (2013)
3. Camacho, J., Macia-Fe Rnandez, G., Diaz-Verdejo, J., et al.: Tackling the big data 4 vs for anomaly detection. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE INFOCOM 2014. IEEE (2014)
4. Xu, W., et al.: Detecting large-scale system problems by mining console logs. In: Proceedings of the 27th International Conference on Machine Learning, ICML-10, Haifa, Israel, 21–24 June 2010 (2010)
5. Therdphapiyanak, J., Piromsopa, K.: Applying hadoop for log analysis toward distributed IDS, pp. 1–6. ACM (2013)