Anomaly Detection in Log Records

Complex software systems are continuously generating application and server logs for the events which had occurred in the past. These logs generated and can be utilized for anomaly and intrusion detection. These log files can be used for anomaly or outlier detection. Certain types of abnormalities o...

全面介紹

Saved in:
書目詳細資料
主要作者: Ghuli, Poonam (Author)
其他作者: Cisco Systems India (Contributor)
格式: EJournal Article
出版: Institute of Advanced Engineering and Science, 2018-04-01.
主題:
在線閱讀:Get fulltext
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!

因特網

Get fulltext

3rd Floor Main Library

持有資料詳情 3rd Floor Main Library
索引號: A1234.567
復印件 1 可用