咨询与建议

限定检索结果

文献类型

  • 1 篇 会议

馆藏范围

  • 1 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 计算机科学与技术...

主题

  • 1 篇 data visualisati...
  • 1 篇 computer network...
  • 1 篇 multiple commodi...
  • 1 篇 intrusion detect...
  • 1 篇 malicious users
  • 1 篇 log data analysi...
  • 1 篇 web-based open p...
  • 1 篇 ids log
  • 1 篇 interactive visu...
  • 1 篇 faulty devices
  • 1 篇 anomaly detectio...
  • 1 篇 network anomaly ...
  • 1 篇 network anomaly ...
  • 1 篇 malicious applic...
  • 1 篇 servers
  • 1 篇 internet
  • 1 篇 market research
  • 1 篇 suspicious patte...
  • 1 篇 visualization
  • 1 篇 collaborative an...

机构

  • 1 篇 chinese acad sci...
  • 1 篇 cent michigan un...

作者

  • 1 篇 zhang tao
  • 1 篇 liao qi
  • 1 篇 shi lei

语言

  • 1 篇 英文
检索条件"主题词=intrusion detection system log"
1 条 记 录,以下是1-10 订阅
排序:
Bridging the Gap of Network Management and Anomaly detection through Interactive Visualization
Bridging the Gap of Network Management and Anomaly Detection...
收藏 引用
IEEE Pacific Visualization Symposium (PacificVis)
作者: Zhang, Tao Liao, Qi Shi, Lei Cent Michigan Univ Dept Comp Sci Mt Pleasant MI 48859 USA Chinese Acad Sci State Key Lab Comp Sci Inst Software Beijing 100864 Peoples R China
Large-scale networks have become increasingly challenging to manage. It is vital for a system administrator or network manager to be able to analyze the vast amount of log data in order to detect suspicious behaviors ... 详细信息
来源: 评论