Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log

Author(s):  
Jianyi Liu ◽  
Keyi Li ◽  
Yang Li ◽  
Ru Zhang ◽  
Xi Duan
Author(s):  
Tao Li ◽  
Shuaichi Zhang ◽  
Hui Chen ◽  
Yongjun Ren ◽  
Xiang Li ◽  
...  

2018 ◽  
Vol 105 (2) ◽  
pp. 673-689 ◽  
Author(s):  
Keon Myung Lee ◽  
Chan Sik Han ◽  
Joong Nam Jun ◽  
Jee Hyong Lee ◽  
Sang Ho Lee

Sign in / Sign up

Export Citation Format

Share Document