共 20 条
[1]
[Anonymous], MAGRITTR FORWARD PIP
[2]
[Anonymous], 2017, EASILY INSTALL LOAD
[3]
Boehmke B., 2017, ANOMALYDETECTION IMP
[4]
Anomaly detection from log files using data mining techniques
[J].
Lecture Notes in Electrical Engineering,
2015, 339
:449-457
[9]
Design and Analysis of a Dynamically Configured Log-based Distributed Security Event Detection Methodology
[J].
JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS,
2012, 9 (03)
:219-241
[10]
Gutierrez R., 2017, J ALGORITHM IN PRESS