共 50 条
- [21] ChainSpot: Mining Service Logs for Cyber Security Threat Detection 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1867 - 1874
- [22] On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
- [23] Data Mining in Cyber, Physical, and Social Computing IEEE SYSTEMS JOURNAL, 2017, 11 (01): : 194 - 196
- [24] Applying Data Mining Techniques in Cyber Crimes 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 213 - 216
- [26] Detecting Periodic Subsequences in Cyber Security Data 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 84 - 90
- [27] Redefining Cyber Security with Big Data Analytics 2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 199 - 203
- [28] Cyber Security Automation for Controlling Distributed Data 2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
- [29] Privacy Principles for Sharing Cyber Security Data 2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 193 - 197