共 50 条
- [1] Converting Unstructured System Logs into Structured Event List for Anomaly Detection 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [2] A Survey of Deep Anomaly Detection for System Logs 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
- [3] Anomaly Detection on Event Logs with a Scarcity of Labels 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
- [4] A Comprehensive Review of Anomaly Detection in Web Logs 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
- [6] User Profiling in Anomaly Detection of Authorization Logs COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65
- [8] ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2008, : 11 - 18
- [9] Automated EWMA Anomaly Detection Pipeline 2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4203 - 4210
- [10] Valid Probabilistic Anomaly Detection Models for System Logs WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020