Sign in

Utilizing Persistence for Post Facto Suppression of Invalid Anomalies Using System Logs.

Dipanwita GuhathakurtaPooja AggarwalSeema NagarRohan R. AroraBing Zhou
Published in: ICSE (NIER) (2022)
Keyphrases
  • anomaly detection
  • detecting anomalies
  • databases
  • business processes
  • root cause
  • real time
  • neural network
  • optimal solution
  • mobile robot
  • edge detection
  • intrusion detection
  • log data
  • log analysis