共 50 条
- [2] A survey on user profiling model for Anomaly Detection in Cyberspace [J]. Journal of Cyber Security and Mobility, 2019, 8 (01): : 75 - 112
- [3] On Cleaning and Organizing Context Logs for Mobile User Profiling [J]. 2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 161 - 164
- [4] A Survey of Deep Anomaly Detection for System Logs [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
- [5] Anomaly Detection on Event Logs with a Scarcity of Labels [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
- [6] System anomaly detection: Mining firewall logs [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
- [7] ADOps: An Anomaly Detection Pipeline in Structured Logs [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (12): : 4050 - 4053
- [8] A Comprehensive Review of Anomaly Detection in Web Logs [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
- [9] ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS [J]. ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2008, : 11 - 18
- [10] Web User Profiling on Proxy Logs and Its Evaluation in Personalization [J]. WEB TECHNOLOGIES AND APPLICATIONS, 2011, 6612 : 107 - +