Text mining for security threat detection discovering hidden information in unstructured log messages
暂无分享,去创建一个
[1] Michele Banko,et al. Mitigating the Paucity-of-Data Problem: Exploring the Effect of Training Corpus Size on Classifier Performance for Natural Language Processing , 2001, HLT.
[2] Kazem Taghva. Identification of Sensitive Unclassified Information , 2009 .
[3] Thorsten Joachims,et al. A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization , 1997, ICML.
[4] Charu C. Aggarwal,et al. A Survey of Text Classification Algorithms , 2012, Mining Text Data.
[5] William K. Robertson,et al. Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks , 2013, ACSAC.
[6] Yiming Yang,et al. A Comparative Study on Feature Selection in Text Categorization , 1997, ICML.
[7] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[8] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[9] Hila Becker,et al. Learning similarity metrics for event identification in social media , 2010, WSDM '10.
[10] Navneet Kaur,et al. Opinion mining and sentiment analysis , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[11] Qiang Fu,et al. Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[12] Tong Zhang,et al. Text Mining: Predictive Methods for Analyzing Unstructured Information , 2004 .
[13] Mitul Tiwari,et al. Entity Extraction, Linking, Classification, and Tagging for Social Media: A Wikipedia-Based Approach , 2013, Proc. VLDB Endow..
[14] Charless C. Fowlkes,et al. Do We Need More Training Data or Better Models for Object Detection? , 2012, BMVC.
[15] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[16] Sotiris B. Kotsiantis,et al. Supervised Machine Learning: A Review of Classification Techniques , 2007, Informatica.
[17] Jing Wang,et al. Improving Short Text Classification Using Public Search Engines , 2013, IUKM.
[18] C. A. Murthy,et al. Effective Text Classification by a Supervised Feature Selection Approach , 2012, 2012 IEEE 12th International Conference on Data Mining Workshops.
[19] Chris Volinsky,et al. Network-Based Marketing: Identifying Likely Adopters Via Consumer Networks , 2006, math/0606278.
[20] Charles Elkan,et al. Results of the KDD'99 classifier learning , 2000, SKDD.
[21] Charu C. Aggarwal,et al. Mining Text Data , 2012, Springer US.
[22] Christoph Meinel,et al. A New Approach to Building a Multi-tier Direct Access Knowledgebase for IDS/SIEM Systems , 2013, 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing.
[23] Gilad Mishne,et al. Finding high-quality content in social media , 2008, WSDM '08.
[24] Ling Huang,et al. Online System Problem Detection by Mining Patterns of Console Logs , 2009, 2009 Ninth IEEE International Conference on Data Mining.