共 50 条
- [1] Converting Unstructured System Logs into Structured Event List for Anomaly Detection [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [2] A Survey of Deep Anomaly Detection for System Logs [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
- [3] Anomaly Detection on Event Logs with a Scarcity of Labels [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
- [4] System anomaly detection: Mining firewall logs [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
- [5] A Comprehensive Review of Anomaly Detection in Web Logs [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
- [6] User Profiling in Anomaly Detection of Authorization Logs [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65
- [7] ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS [J]. ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2008, : 11 - 18
- [8] Automated EWMA Anomaly Detection Pipeline [J]. 2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4203 - 4210
- [9] Valid Probabilistic Anomaly Detection Models for System Logs [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
- [10] Exploring syntactical features for anomaly detection in application logs [J]. IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 15 - 27