Anomaly Detection in Log Records

Complex software systems are continuously generating application and server logs for the events which had occurred in the past. These logs generated and can be utilized for anomaly and intrusion detection. These log files can be used for anomaly or outlier detection. Certain types of abnormalities o...

Description complète

Enregistré dans:
Détails bibliographiques
Auteur principal: Ghuli, Poonam (Auteur)
Autres auteurs: Cisco Systems India (Collaborateur)
Format: EJournal Article
Publié: Institute of Advanced Engineering and Science, 2018-04-01.
Sujets:
Accès en ligne:Get fulltext
Tags: Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!

Internet

Get fulltext

3rd Floor Main Library

Informations d'exemplaires de 3rd Floor Main Library
Cote: A1234.567
Exemplaire 1 Disponible