Author:
Siaterlis Christos,Maglaris Basil
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Building Golden Signal Based Signatures for Log Anomaly Detection;2022 IEEE 15th International Conference on Cloud Computing (CLOUD);2022-07
2. Utilizing persistence for post facto suppression of invalid anomalies using system logs;Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results;2022-05-21
3. Utilizing Persistence for Post Facto Suppression of Invalid Anomalies Using System Logs;2022 IEEE/ACM 44th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER);2022-05
4. Anomaly Detection Techniques in Data Mining—A Review;Lecture Notes in Networks and Systems;2020
5. Development of a method for fraud detection in heterogeneous data during installation of mobile applications;Eastern-European Journal of Enterprise Technologies;2019-01-24