ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Communication Network Anomaly Detection Based on Log File Analysis
Rough Sets and Knowledge Technology - Lecture Notes in Computer Science
◽
10.1007/978-3-319-11740-9_23
◽
2014
◽
pp. 240-248
Author(s):
Xin Cheng
◽
Ruizhi Wang
Keyword(s):
Communication Network
◽
Anomaly Detection
◽
Log File Analysis
◽
Log File
◽
Network Anomaly Detection
Download Full-text
Related Documents
Cited By
References
Entropy-based robust PCA for communication network anomaly detection
2014 IEEE/CIC International Conference on Communications in China (ICCC)
◽
10.1109/iccchina.2014.7008266
◽
2014
◽
Cited By ~ 1
Author(s):
Duo Liu
◽
Chung-Horng Lung
◽
Nabil Seddigh
◽
Biswajit Nandy
Keyword(s):
Communication Network
◽
Anomaly Detection
◽
Robust Pca
◽
Network Anomaly Detection
Download Full-text
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection
Computers & Security
◽
10.1016/j.cose.2018.08.009
◽
2018
◽
Vol 79
◽
pp. 94-116
◽
Cited By ~ 8
Author(s):
Max Landauer
◽
Markus Wurzenberger
◽
Florian Skopik
◽
Giuseppe Settanni
◽
Peter Filzmoser
Keyword(s):
Anomaly Detection
◽
Unsupervised Cluster
◽
Log File Analysis
◽
Cluster Evolution
◽
Log File
◽
Evolution Approach
Download Full-text
Drills, Games or Tests? Evaluating Students' Motivation in Different Online Learning Activities, Using Log File Analysis
Interdisciplinary Journal of e-Skills and Lifelong Learning
◽
10.28945/1522
◽
2011
◽
Vol 7
◽
pp. 235-248
◽
Cited By ~ 3
Author(s):
Galit Ben-Zadok
◽
Moshe Leiba
◽
Rafi Nachmias
Keyword(s):
Online Learning
◽
Learning Activities
◽
Log File Analysis
◽
Log File
Download Full-text
Improved negative selection algorithm for network anomaly detection on high-dimensional data
Journal of Computer Applications
◽
10.3724/sp.j.1087.2009.00805
◽
2009
◽
Vol 29
(3)
◽
pp. 805-807
◽
Cited By ~ 1
Author(s):
Wen-zhong GUO
◽
Guo-long CHEN
◽
Qing-liang CHEN
Keyword(s):
Anomaly Detection
◽
Negative Selection
◽
High Dimensional Data
◽
High Dimensional
◽
Selection Algorithm
◽
Negative Selection Algorithm
◽
Network Anomaly Detection
Download Full-text
Network anomaly detection based on selective ensemble algorithm
The Journal of Supercomputing
◽
10.1007/s11227-020-03374-z
◽
2020
◽
Author(s):
Hongle Du
◽
Yan Zhang
Keyword(s):
Anomaly Detection
◽
Selective Ensemble
◽
Ensemble Algorithm
◽
Network Anomaly Detection
Download Full-text
Network Anomaly Detection using Threshold-based Sparse
Proceedings of the 11th International Conference on Advances in Information Technology
◽
10.1145/3406601.3406626
◽
2020
◽
Author(s):
May Thet Tun
◽
Dim En Nyaung
◽
Myat Pwint Phyu
Keyword(s):
Anomaly Detection
◽
Network Anomaly Detection
Download Full-text
Time-series Network Anomaly Detection Based on Behaviour Characteristics
2020 IEEE 6th International Conference on Computer and Communications (ICCC)
◽
10.1109/iccc51575.2020.9345249
◽
2020
◽
Author(s):
Xiaoyue Yu
◽
Tao Li
◽
Aiqun Hu
Keyword(s):
Time Series
◽
Anomaly Detection
◽
Network Anomaly Detection
Download Full-text
Few-shot Network Anomaly Detection via Cross-network Meta-learning
Proceedings of the Web Conference 2021
◽
10.1145/3442381.3449922
◽
2021
◽
Author(s):
Kaize Ding
◽
Qinghai Zhou
◽
Hanghang Tong
◽
Huan Liu
Keyword(s):
Anomaly Detection
◽
Meta Learning
◽
Network Anomaly Detection
Download Full-text
Network Anomaly Detection Based on In-band Network Telemetry with RNN
2020 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia)
◽
10.1109/icce-asia49877.2020.9276768
◽
2020
◽
Author(s):
Sukhyun Nam
◽
Jiyoon Lim
◽
Jae-Hyoung Yoo
◽
James Won-Ki Hong
Keyword(s):
Anomaly Detection
◽
Network Anomaly Detection
Download Full-text
An Accuracy Network Anomaly Detection Method Based on Ensemble Model
ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
◽
10.1109/icassp39728.2021.9414675
◽
2021
◽
Author(s):
Fengrui Liu
◽
Xuefei Li
◽
Wei Xiong
◽
Haiyang Jiang
◽
Gaogang Xie
Keyword(s):
Anomaly Detection
◽
Detection Method
◽
Ensemble Model
◽
Network Anomaly Detection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close