Sharpening Kubernetes Audit Logs with Context Awareness Authors: Matteo Franzil, Valentino Armani, Luis Augusto Dias Knob, Domenico Siracusa | Published: 2025-06-19 | Updated: 2025-10-27 Challenges of Log AnalysisPerformance Evaluation Method監査手法 2025.06.19 2025.10.29 Literature Database
RAGLog: Log Anomaly Detection using Retrieval Augmented Generation Authors: Jonathan Pan, Swee Liang Wong, Yidi Yuan | Published: 2023-11-09 Clustering methodsClass ImbalanceChallenges of Log Analysis 2023.11.09 2025.05.28 Literature Database
IsoEx: an explainable unsupervised approach to process event logs cyber investigation Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21 AlgorithmChallenges of Log AnalysisFeature Extraction Method 2023.06.07 2025.05.28 Literature Database
ESAFE: Enterprise Security and Forensics at Scale Authors: Bernard McShea, Kevin Wright, Denley Lam, Steve Schmidt, Anna Choromanska, Devansh Bisla, Shihong Fang, Alireza Sarmadi, Prashanth Krishnamurthy, Farshad Khorrami | Published: 2021-12-08 Data-Driven ClusteringChallenges of Log AnalysisThreat modeling 2021.12.08 2025.05.28 Literature Database