共 46 条
[1]
Abu Bakar Z, 2006, CONF CYBERN INTELL S, P360
[3]
Ben Salem M, 2008, ADV INFORM SECUR, V39, P69
[4]
Lipton ZC, 2015, Arxiv, DOI [arXiv:1506.00019, 10.48550/arXiv.1506.00019]
[5]
Cadez I., 2000, Proceedings. KDD-2000. Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, P280, DOI 10.1145/347090.347151
[6]
Cappelli DM., 2012, The cert guide to insider threats: How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
[7]
Chen P, 2014, LECT NOTES COMPUT SC, V8735, P63, DOI 10.1007/978-3-662-44885-4_5
[8]
Cho K., 2014, P EMPIRICAL METHODS, P1724, DOI 10.48550/arXiv.1406.1078
[9]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[10]
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM networks
[J].
2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN),
2017,
:261-272