共 12 条
[1]
Al-Omari Ahmad, 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P3317, DOI 10.1109/HICSS.2012.516
[2]
Insider threat Detection using Log analysis and Event Correlation
[J].
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA),
2015, 45
:436-445
[3]
Bing M, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P101
[4]
Brunel J, 2007, FMSE'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON FORMAL METHODS IN SECURITY ENGINEERING, P31
[5]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[7]
Oliner A., 2011, ADV CHALLENGES LOG A, P30
[8]
ScienceDirect, 2017, WHAT MAK EFF INF SEC
[9]
Shenk J., 2014, Ninth log management survey report
[10]
Syukur E., 2005, METHODS POLICY CONFL