A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity.
Matthew BantonNathan ShoneWilliam HurstQi ShiPublished in: ICT-DM (2019)
Keyphrases
- detecting anomalous
- anomaly detection
- detection algorithm
- detection method
- user activity
- neural network
- automatic detection
- human activities
- artificial intelligence
- human computer interaction
- video data
- hidden markov models
- data mining
- combining multiple
- real world
- log analysis
- detect anomalies
- anomalous behavior
- data sets