Login / Signup
Identifying irregularities in security event logs through an object-based Chi-squared test of independence.
Simon Parkinson
Saad Khan
Published in:
J. Inf. Secur. Appl. (2018)
Keyphrases
</>
chi squared
event logs
process mining
security policies
information gain
process model
information security
distributed systems
access control
network security
genetic programming
log files
business process
feature selection
correlation coefficient
mutual information
supervised learning
case study