Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference62 articles.
1. System log clustering approaches for cyber security applications: A survey;Landauer;Comput. Secur.,2020
2. Experience report: system log analysis for anomaly detection;He,2016
3. Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach;Khan;Expert Syst. Appl.,2018
4. W. Meng, Y. Liu, Y. Zhu, S. Zhang, D. Pei, Y. Liu, Y. Chen, R. Zhang, S. Tao, P. Sun, et al. Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs, in: Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19, vol. 7, 2019, pp. 4739–4745, http://dx.doi.org/10.24963/ijcai.2019/658.
5. P. Gao, X. Xiao, D. Li, Z. Li, K. Jee, Z. Wu, C.H. Kim, S.R. Kulkarni, P. Mittal, SAQL: A stream-based query system for real-time abnormal system behavior detection, in: 27th USENIX Security Symposium, USENIX Security 18, 2018, pp. 639–656.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献