共 44 条
[1]
Bace R. G., 2001, NIST special publication on intrusion detection systems
[2]
Experience Report: Log Mining using Natural Language Processing and Application to Anomaly Detection
[J].
2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE),
2017,
:351-360
[4]
Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
[J].
PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING FOR COMPUTING SYSTEMS (MLCS 2018),
2018,
[5]
Chalapathy R, 2019, Arxiv, DOI arXiv:1901.03407
[6]
Cheng Q, 2023, Arxiv, DOI arXiv:2304.04661
[7]
Clark K, 2020, Arxiv, DOI [arXiv:2003.10555, DOI 10.48550/ARXIV.2003.10555]
[8]
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[9]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[10]
Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.160, 10.1109/ICDM.2016.0103]