anomalyDetection: Implementation of Augmented Network Log Anomaly Detection Procedures
暂无分享,去创建一个
[1] Duane T. Wegener,et al. Evaluating the use of exploratory factor analysis in psychological research. , 1999 .
[2] Trevor J. Bihl,et al. Cyber anomaly detection: Using tabulated vectors and embedded analytics for efficient data mining , 2018, Journal of Algorithms & Computational Technology.
[3] H. Kaiser. An index of factorial simplicity , 1974 .
[4] D. Jayathilake,et al. Towards structured log analysis , 2012, 2012 Ninth International Conference on Computer Science and Software Engineering (JCSSE).
[5] Hee Sun Park,et al. The Use of Exploratory Factor Analysis and Principal Components Analysis in Communication Research , 2002 .
[6] Wayne G. Lutters,et al. Developing expertise for network intrusion detection , 2009, Inf. Technol. People.
[7] J. Horn. A rationale and test for the number of factors in factor analysis , 1965, Psychometrika.
[8] Jakub Breier,et al. Anomaly Detection from Log Files Using Data Mining Techniques , 2015 .
[9] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[10] T. L. Reguianski. The Air Force Institute of Technology , 1962 .
[11] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[12] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[13] Robert F. Mills,et al. Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology , 2012 .
[14] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[15] Michael J. Chapple,et al. System Anomaly Detection: Mining Firewall Logs , 2006, 2006 Securecomm and Workshops.
[16] Mahdi Zamani,et al. Machine Learning Techniques for Intrusion Detection , 2013, ArXiv.