Anomaly Detection in Log Records

Complex software systems are continuously generating application and server logs for the events which had occurred in the past. These logs generated and can be utilized for anomaly and intrusion detection. These log files can be used for anomaly or outlier detection. Certain types of abnormalities o...

Full description

Saved in:
Bibliographic Details
Main Author: Ghuli, Poonam (Author)
Other Authors: Cisco Systems India (Contributor)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2018-04-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!

Internet

Get fulltext

3rd Floor Main Library

Holdings details from 3rd Floor Main Library
Call Number: A1234.567
Copy 1 Available