Detecting anomalies in DNS protocol traces via Passive Testing and Process Mining
暂无分享,去创建一个
[1] David Lee,et al. Principles and methods of testing finite state machines-a survey , 1996, Proc. IEEE.
[2] David Lee,et al. Network protocol system monitoring-a formal approach with passive testing , 2006, IEEE/ACM Transactions on Networking.
[3] K. A. Arisha,et al. On fault location in networks by passive testing , 2000, Conference Proceedings of the 2000 IEEE International Performance, Computing, and Communications Conference (Cat. No.00CH37086).
[4] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[5] David Carrera,et al. Business Process Mining from E-Commerce Web Logs , 2013, BPM.
[6] R. E. Miller,et al. Passive testing of networks using a CFSM specification , 1998, 1998 IEEE International Performance, Computing and Communications Conference. Proceedings (Cat. No.98CH36191).
[7] Stéphane Maag,et al. Passive performance testing of network protocols , 2014, Comput. Commun..
[8] Hajo A. Reijers,et al. Discovering Social Networks from Event Logs , 2005, Computer Supported Cooperative Work (CSCW).
[9] Wil M. P. van der Aalst,et al. Process Mining - Discovery, Conformance and Enhancement of Business Processes , 2011 .
[10] Wil M. P. van der Aalst,et al. Conformance Checking in the Large: Partitioning and Topology , 2013, BPM.
[11] Wil M. P. van der Aalst,et al. Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..