共 28 条
[1]
Insider threat Detection using Log analysis and Event Correlation
[J].
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA),
2015, 45
:436-445
[2]
Baker W., 2018, RSA C SAN FRANC
[3]
Balraj Balla Prashanth, 2018, P INT C SMART CIT EM, P1, DOI [10.1109/ICSCET.2018.8537344, DOI 10.1109/ICSCET.2018.8537344]
[4]
Baruah S., 2019, INT J COMPUT INTELL, V2, P7
[5]
Brashear J., 2016, NEW NORMAL EXPONENTI
[7]
Goosen R., ARTIFICIAL INTELLIGE
[8]
Heinemeyer M., THWARTING INVISIBLE
[9]
Hitaj B., 2018, NEURLPS 2018 WORKSH
[10]
Hospelhorn S., VARONIS WHAT IS CYBE