Author:
Hassan Wajih Ul,Noureddine Mohammad A.,Datta Pubali,Bates Adam
Cited by
56 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Log refusion: adversarial attacks against the integrity of application logs and defense methods;SCIENTIA SINICA Informationis;2024-09-01
2. Prov2vec: Learning Provenance Graph Representation for Anomaly Detection in Computer Systems;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
3. Process-Aware Intrusion Detection in MQTT Networks;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19
4. On the inadequacy of open-source application logs for digital forensics;Forensic Science International: Digital Investigation;2024-06
5. MAAD: A Distributed Anomaly Detection Architecture for Microservices Systems;2024 IEEE International Parallel and Distributed Processing Symposium (IPDPS);2024-05-27