Automatic Log Analysis using Machine Learning : Awesome Automatic Log Analysis version 2.0
暂无分享,去创建一个
[1] Kimmo Hätönen,et al. Local Anomaly Detection for Network System Log Monitoring , 2007 .
[2] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[3] Michal Aharon,et al. One Graph Is Worth a Thousand Logs: Uncovering Hidden Structures in Massive System Event Logs , 2009, ECML/PKDD.
[4] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[5] S. J. QinDepartment. Multi-dimensional Fault Diagnosis Using a Subspace Approach , 1997 .
[6] Tuomo Sipola,et al. Anomaly Detection from Network Logs Using Diffusion Maps , 2011, EANN/AIAI.
[7] Karen Spärck Jones. A statistical interpretation of term specificity and its application in retrieval , 2021, J. Documentation.
[8] Geoffrey J. McLachlan,et al. Analyzing Microarray Gene Expression Data , 2004 .
[9] Chris Lonvick,et al. The BSD Syslog Protocol , 2001, RFC.
[10] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[11] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[12] Wei-Ying Ma,et al. Automated known problem diagnosis with event traces , 2006, EuroSys.
[13] Teuvo Kohonen,et al. Self-organized formation of topologically correct feature maps , 2004, Biological Cybernetics.
[14] Michael I. Jordan,et al. Detecting large-scale system problems by mining console logs , 2009, SOSP '09.
[15] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[16] Stephen V. Stehman,et al. Selecting and interpreting measures of thematic classification accuracy , 1997 .
[17] W. B. Cavnar,et al. N-gram-based text categorization , 1994 .
[18] Jun Zheng,et al. Anomaly Detection Using Fast SOFM , 2004, GCC Workshops.
[19] John Fulcher,et al. Computational Intelligence: An Introduction , 2008, Computational Intelligence: A Compendium.
[20] Sami Nousiainen,et al. Anomaly detection from server log data. A case study , 2009 .
[21] M. Kendall,et al. An Introduction to the Theory of Statistics. , 1911 .
[22] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[23] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[24] R. Plackett. An introduction to the theory of statistics , 1972 .
[25] Mark Crovella,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.
[26] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[27] Anand Singh Jalal,et al. A Density Based Algorithm for Discovering Density Varied Clusters in Large Spatial Databases , 2010 .
[28] Khaled Labib,et al. NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps , 2002 .
[29] Shawn Ostermann,et al. Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.
[30] Karl Pearson F.R.S.. LIII. On lines and planes of closest fit to systems of points in space , 1901 .
[31] Finn Verner Jensen,et al. Introduction to Bayesian Networks , 2008, Innovations in Bayesian Networks.
[32] Jon Stearley,et al. What Supercomputers Say: A Study of Five System Logs , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[33] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[34] Ahmed H. Tewfik,et al. Robust clustering of acoustic emission signals using the Kohonen network , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[35] Ali A. Ghorbani,et al. Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[36] Barbara J. Grosz,et al. Natural-Language Processing , 1982, Artificial Intelligence.
[37] 饭沼敏范. Radio base station , 2000 .