共 50 条
- [1] Converting Unstructured System Logs into Structured Event List for Anomaly Detection [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [2] SwissLog: Robust and Unified Deep Learning Based Log Anomaly Detection for Diverse Faults [J]. 2020 IEEE 31ST INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2020), 2020, : 92 - 103
- [3] Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020), 2020, : 1196 - 1201
- [5] A Survey of Deep Anomaly Detection for System Logs [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
- [6] Anomaly Detection on Event Logs with a Scarcity of Labels [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
- [7] System anomaly detection: Mining firewall logs [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
- [8] ADOps: An Anomaly Detection Pipeline in Structured Logs [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (12): : 4050 - 4053
- [9] A Comprehensive Review of Anomaly Detection in Web Logs [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
- [10] User Profiling in Anomaly Detection of Authorization Logs [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65