共 26 条
[1]
Cyber Threat Intelligence from Honeypot Data using Elasticsearch
[J].
PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA),
2018,
:900-906
[2]
Design of a Dynamic Log Management Infrastructure Using Risk and Affiliation Network Analysis
[J].
22ND PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2018),
2018,
:52-57
[3]
[Anonymous], 2018, ELASTICSEARCH GUIDAN
[4]
[Anonymous], 2018, ELK Stack
[5]
[Anonymous], 2018, NGINX INTRO
[6]
[Anonymous], 2018, COMPLETE GUIDE ELK S
[7]
Awad M, 2015, COMPUTER MEASUREMENT
[8]
Bafumba Liseli J, 2018, IEEE INT CON AUTO SC, P1605, DOI 10.1109/COASE.2018.8560362
[9]
Chuvakin A., 2012, Logging and log management: the authoritative guide to dealing with syslog, audit logs, events, alerts and other it 'noise'
[10]
Gormley C., 2015, Elasticsearch: The Definitive Guide