Filtering events using clustering in heterogeneous security logs
暂无分享,去创建一个
[1] Dario Forte. The “ART” of log correlation: part 1 , 2004 .
[2] Anil K. Jain. Data clustering: 50 years beyond K-means , 2010, Pattern Recognit. Lett..
[3] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[4] Somesh Jha,et al. A Declarative Framework for Intrusion Analysis , 2010, Cyber Situational Awareness.
[5] Yue-Shi Lee,et al. Cluster-based under-sampling approaches for imbalanced data distributions , 2009, Expert Syst. Appl..
[6] Nur Izura Udzir,et al. A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection , 2011 .
[7] Dhruba Kumar Bhattacharyya,et al. Anomaly Detection Analysis of Intrusion Data Using Supervised & Unsupervised Approach , 2010, J. Convergence Inf. Technol..