Anomaly Detection in Log Records
Complex software systems are continuously generating application and server logs for the events which had occurred in the past. These logs generated and can be utilized for anomaly and intrusion detection. These log files can be used for anomaly or outlier detection. Certain types of abnormalities o...
Wedi'i Gadw mewn:
Prif Awdur: | |
---|---|
Awduron Eraill: | |
Fformat: | EJournal Article |
Cyhoeddwyd: |
Institute of Advanced Engineering and Science,
2018-04-01.
|
Pynciau: | |
Mynediad Ar-lein: | Get fulltext |
Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
Rhyngrwyd
Get fulltext3rd Floor Main Library
Rhif Galw: |
A1234.567 |
---|---|
Copi 1 | Ar gael |