共 32 条
[1]
Behavior Analysis in the Medical Sector: Theory and Practice
[J].
33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING,
2018,
:1637-1646
[2]
Amer M., 2013, P ACM SIGKDD WORKSHO, P8, DOI DOI 10.1145/2500853.2500857
[3]
USAD : UnSupervised Anomaly Detection on Multivariate Time Series
[J].
KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING,
2020,
:3395-3404
[4]
datafountain, 2022, Big data platform security event detection and classification identification
[5]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[6]
Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.0103, 10.1109/ICDM.2016.160]
[7]
Gafny M, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P765
[8]
Drain: An Online Log Parsing Approach with Fixed Depth Tree
[J].
2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017),
2017,
:33-40
[9]
Hussain S.R., 2015, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, P25, DOI DOI 10.1145/2699026.2699111
[10]
Khan MI, 2020, Arxiv, DOI [arXiv:2011.02308, DOI 10.1007/978-3-030-93956]