Defining a Metric Space of Host Logs and Operational Use Cases Authors: Miki E. Verma, Robert A. Bridges | Published: 2018-11-01 Client ClusteringDigital ForensicsAnomaly Detection in Logs 2018.11.01 2025.05.28 Literature Database
Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection Authors: Jinoh Kim, Caitlin Sim, Jinhwan Choi | Published: 2018-10-03 Data GenerationAnomaly Detection in LogsResearch Methodology 2018.10.03 2025.05.28 Literature Database