Log-Based Anomaly Detection for System Surveillance
暂无分享,去创建一个
[1] Chris Phillips,et al. Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management , 2012 .
[2] Raymond T. Ng,et al. Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.
[3] Andrew Hay,et al. OSSEC Host-Based Intrusion Detection Guide , 2008 .
[4] Peter Jackson,et al. Natural language processing for online applications : text retrieval, extraction and categorization , 2002 .
[5] Srinivasan Parthasarathy,et al. Fast mining of distance-based outliers in high-dimensional datasets , 2008, Data Mining and Knowledge Discovery.
[6] Philip S. Yu,et al. Data Mining: An Overview from a Database Perspective , 1996, IEEE Trans. Knowl. Data Eng..
[7] Chia-Hui Chang,et al. Categorical data visualization and clustering using subjective factors , 2005, Data Knowl. Eng..
[8] Juha Vesanto,et al. SOM-based data visualization methods , 1999, Intell. Data Anal..
[9] Jaideep Srivastava,et al. A hybrid-logic approach towards fault detection in complex cyber-physical systems , 2010 .
[10] Colin Ware,et al. Information Visualization: Perception for Design , 2000 .
[11] Kim Schaffer,et al. An Overview of Anomaly Detection , 2013, IT Professional.
[12] D. Hand,et al. Unsupervised Profiling Methods for Fraud Detection , 2002 .
[13] Setsuo Ohsuga,et al. INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES , 1977 .
[14] D. Jayathilake,et al. Towards structured log analysis , 2012, 2012 Ninth International Conference on Computer Science and Software Engineering (JCSSE).
[15] Adam Jacobs,et al. The pathologies of big data , 2009, Commun. ACM.
[16] Esmaeili Mohammadjafar,et al. Stream Data Mining and Anomaly Detection , 2011 .
[17] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[18] David J. Hill,et al. Anomaly detection in streaming environmental sensor data: A data-driven modeling approach , 2010, Environ. Model. Softw..
[19] Thomas J. Veasey,et al. Anomaly Detection in Application Performance Monitoring Data , 2014 .
[20] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[21] Brian Tierney,et al. Log summarization and anomaly detection for troubleshooting distributed systems , 2007, 2007 8th IEEE/ACM International Conference on Grid Computing.
[22] Kenji Yamanishi,et al. Dynamic syslog mining for network failure monitoring , 2005, KDD '05.