Intrusion Detection at Scale with the Assistance of a Command-line Language Model Authors: Jiongliang Lin, Yiwen Guo, Hao Chen | Published: 2024-04-20 Command AnalysisAnomaly Detection MethodAutomated Intrusion Detection System 2024.04.20 2025.05.27 Literature Database
Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs Authors: Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija, Aram Galstyan | Published: 2021-04-20 Command AnalysisUser Activity AnalysisTime-Related Features 2021.04.20 2025.05.28 Literature Database