Author:
Pérez-Gomariz Mario,Cerdán-Cartagena Fernando,García Jess
Reference80 articles.
1. Graph based anomaly detection and description: a survey;L Akoglu;Data Mining and Knowledge Discovery,2015
2. Can language models help in system security? Investigating log anomaly detection using BERT;C Almodovar;Proceedings of the The 20th Annual Workshop of the Australasian Language Technology Association,2022
3. An analysis of conti ransomware leaked source codes;S Alzahrani;IEEE Access,2022