Login / Signup
Mining Host Behavior Patterns From Massive Network and Security Logs.
Jing Ya
Tingwen Liu
Quangang Li
Jinqiao Shi
Haoliang Zhang
Pin Lv
Li Guo
Published in:
ICCS (2017)
Keyphrases
</>
behavior patterns
network monitoring
security threats
security measures
behavioral patterns
behavior analysis
intrusion detection
network management
network traffic
buffer overflow
data analysis
data mining
web logs
security issues
log analysis
customer behavior
computer networks
cyber attacks
itemsets
enterprise network
machine learning
object recognition
knowledge discovery
cyber security
user interaction
security requirements
complex networks
security policies
communication networks