共 23 条
[1]
Bose RPJC, 2013, 2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING (CIDM), P111, DOI 10.1109/CIDM.2013.6597225
[2]
Analyzing Boundary Device Logs on the In-Memory Platform
[J].
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS),
2015,
:1367-1372
[3]
Edgeworth F.Y., 1887, PHIL MAG J SCI, V23, P364, DOI [DOI 10.1080/14786448708628471, 10.1080/14786448708628471doi.org/10.1080/14786448708628471]
[6]
Normalizing Security Events with a Hierarchical Knowledge Base
[J].
INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2015,
2015, 9311
:237-248
[7]
Liang YL, 2005, I C DEPEND SYS NETWO, P476
[8]
Ma S., 2002, PATTERN RECOGN, P353
[9]
What supercomputers say: A study of five system logs
[J].
37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS,
2007,
:575-+
[10]
Alert Detection in System Logs
[J].
ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS,
2008,
:959-+