An Explainable Intelligence Model for Security Event Analysis
暂无分享,去创建一个
[1] George M. Mohay,et al. CAT Detect (Computer Activity Timeline Detection) : a toolfor detecting inconsistency in computer activity timelines , 2011 .
[2] Simon Parkinson,et al. Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach , 2018, Expert Syst. Appl..
[3] Tutut Herawan,et al. A novel association rule mining approach using TID intermediate itemset , 2018, PloS one.
[4] Qiong Wu,et al. Internet of Things Based Data Driven Storytelling for Supporting Social Connections , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[5] George M. Mohay,et al. RICH EVENT REPRESENTATION FOR COMPUTER FORENSICS , 2004 .
[6] Colin J. Fidge,et al. Reconstruction of Falsified Computer Logs for Digital Forensics Investigations , 2010, AISC.
[7] Mazaher Ghorbani,et al. A New Methodology for Mining Frequent Itemsets on Temporal Data , 2017, IEEE Transactions on Engineering Management.
[8] Sushil Jajodia,et al. Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance , 2014, Cybersecurity Systems for Human Cognition Augmentation.
[9] Andreas Ekelhart,et al. Taming the logs - Vocabularies for semantic security analysis , 2018, SEMANTICS.
[10] Yuan Fang,et al. Basket-Sensitive Personalized Item Recommendation , 2017, IJCAI.
[11] Anjana Kakoti Mahanta,et al. Finding calendar-based periodic patterns , 2008, Pattern Recognit. Lett..
[12] Ferdous Sohel,et al. A survey on forensic investigation of operating system logs , 2019, Digit. Investig..
[13] Xiting Wang,et al. Towards better analysis of machine learning models: A visual analytics perspective , 2017, Vis. Informatics.
[14] M. Tahar Kechadi,et al. An ontology-based approach for the reconstruction and analysis of digital incidents timelines , 2015, Digit. Investig..