Monitoring computer systems for crypto mining threat detection.
Ioan Septimiu DinulicaDan CosmaPublished in: ICSTCC (2020)
Keyphrases
- computer systems
- data processing
- operating system
- hardware and software
- computing systems
- information systems
- communication systems
- computer networks
- computer architecture
- monitoring system
- human beings
- detection algorithm
- computer security
- computer technology
- real time
- detect anomalies
- intrusion detection system
- knowledge discovery
- anomaly detection
- itemsets
- high end
- computer hardware
- databases
- frequent patterns
- software developers
- metadata