Your selections:
LogSD: Detecting anomalies from system logs through self-supervised learning and frequency-based masking
- Xie, Yongzheng, Zhang, Hongyu, Babar, Muhammad Ali
- Zhang, Bo, Zhang, Hongyu, Le, Van-Hoang, Moscato, Pablo, Zhang, Aozhong
Log-based Anomaly Detection with Deep Learning: How Far Are We?
- Le, Van-Hoang, Zhang, Hongyu
LogGD: Detecting Anomalies from System Logs with Graph Neural Networks
- Xie, Yongzheng, Zhang, Hongyu, Babar, Muhammad Ali
A review of time-series anomaly detection techniques: a step to future perspectives
- Shaukat, Kamran, Alam, Talha Mahboob, Luo, Suhuai, Shabbir, Shakir, Hameed, Ibrahim A., Li, Jiaming, Abbas, Syed Konain, Javed, Umair
Log-based Anomaly Detection Without Log Parsing
- Le, Van-Hoang, Zhang, Hongyu
Anomaly detection via mining numerical workflow relations from logs
- Zhang, Bo, Zhang, Hongyu, Moscato, Pablo, Zhang, Aozhong
VMGuard: A VMI-based Security Architecture for Intrusion Detection in Cloud Environment
- Mishra, Preeti, Varadharajan, Vijay, Pilli, Emmanuel S., Tupakula, Uday
Investigating the effects of varying cluster numbers on anomalies detected in mining machines
- Fan, Zongwen, Chiong, Raymond, Hu, Zhongyi, Lin, Yuqing
Are you sure you would like to clear your session, including search history and login status?