Anomaly Detection in Log Records

Complex software systems are continuously generating application and server logs for the events which had occurred in the past. These logs generated and can be utilized for anomaly and intrusion detection. These log files can be used for anomaly or outlier detection. Certain types of abnormalities o...

Disgrifiad llawn

Wedi'i Gadw mewn:
Manylion Llyfryddiaeth
Prif Awdur: Ghuli, Poonam (Awdur)
Awduron Eraill: Cisco Systems India (Cyfrannwr)
Fformat: EJournal Article
Cyhoeddwyd: Institute of Advanced Engineering and Science, 2018-04-01.
Pynciau:
Mynediad Ar-lein:Get fulltext
Tagiau: Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!

Rhyngrwyd

Get fulltext

3rd Floor Main Library

Manylion daliadau o 3rd Floor Main Library
Rhif Galw: A1234.567
Copi 1 Ar gael