共 50 条
- [42] Robust Log-Based Anomaly Detection on Unstable Log Data ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 807 - 817
- [43] UiLog: Improving Log-Based Fault Diagnosis by Log Analysis Journal of Computer Science and Technology, 2016, 31 : 1038 - 1052
- [44] A CONCURRENCY-CONTROL SCHEME FOR NESTED TRANSACTIONS MICROPROCESSING AND MICROPROGRAMMING, 1989, 25 (1-5): : 233 - 238
- [45] A key recovery attack on discrete log-based schemes using a prime order subgroup ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 249 - 263
- [46] Implementation and overhead analysis of a log-based intrusion recovery module on Linux file system 2004 JOINT CONFERENCE OF THE 10TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS AND THE 5TH INTERNATIONAL SYMPOSIUM ON MULTI-DIMENSIONAL MOBILE COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 548 - 552
- [47] A Two-Phase Log-based Fault Recovery Mechanism in Master/Worker based Computing Environment 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 290 - 297
- [48] Enhancing Automata Learning by Log-Based Metrics INTEGRATED FORMAL METHODS (IFM 2016), 2016, 9681 : 295 - 310
- [49] The Research of Log-Based Network Monitoring System ADVANCES IN INTELLIGENT SYSTEMS, 2012, 138 : 315 - 320
- [50] Process replication with log-based amnesia support ISPDC 2007: SIXTH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING, PROCEEDINGS, 2007, : 367 - +