Anomaly Detection in Logs

Defining a Metric Space of Host Logs and Operational Use Cases

Authors: Miki E. Verma, Robert A. Bridges | Published: 2018-11-01
Client Clustering
Digital Forensics
Anomaly Detection in Logs

Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection

Authors: Jinoh Kim, Caitlin Sim, Jinhwan Choi | Published: 2018-10-03
Data Generation
Anomaly Detection in Logs
Research Methodology