共 30 条
[1]
Aldawud O., 2003, P 3 INT WORKSH ASP O
[2]
[Anonymous], 2005, P 5 ACM SIGCOMM C IN
[3]
Balasch J., 2011, 2011 WORKSH FAULT DI, P105, DOI DOI 10.1109/FDTC.2011.9
[4]
Bell R., 2006, P 10 AUSTR WORKSH SA, V55, P3
[5]
Biere A, 1999, LECT NOTES COMPUT SC, V1579, P193
[7]
Chollet F, 2015, KERAS
[8]
Clarke E. M., 2012, TOOLS PRACTICAL SOFT, V7682, DOI [10.1007/978-3-642-35746-6_1, DOI 10.1007/978-3-642-35746-6_1]
[9]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[10]
An Imputation-based Augmented Anomaly Detection from Large Traces of Operating System Events
[J].
BDCAT'17: PROCEEDINGS OF THE FOURTH IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES,
2017,
:43-52