System log clustering approaches for cyber security applications: A survey.
Max LandauerFlorian SkopikMarkus WurzenbergerAndreas RauberPublished in: Comput. Secur. (2020)
Keyphrases
- cyber security
- clustering approaches
- smart grid
- clustering method
- intrusion detection
- clustering algorithm
- k means
- subspace clustering
- cyber attacks
- hierarchical clustering
- document clustering
- data objects
- semi supervised
- security issues
- critical infrastructure
- network security
- intrusion detection system
- visual analytics
- anomaly detection
- pairwise constraints
- data mining
- data sets
- power system
- real world
- information retrieval
- spectral clustering
- feature extraction
- machine learning
- databases