Back to Results
First PageMeta Content
Log analysis / Trace / Runtime verification / Linear algebra / Mathematics / Norm


6th Symposium on Security Analytics and Automation, IEEEDiscovering Emergent Norms in Security Logs Olgierd Pieczul∗† , Simon N. Foley† ∗ Ireland † Computer
Add to Reading List

Document Date: 2013-11-08 09:08:56


Open Document

File Size: 530,22 KB

Share Result on Facebook

City

Dublin / perm / Washington / DC / Edinburgh / /

Company

IBM Software Group / /

Country

United States / United Kingdom / Ireland / /

/

Facility

University College Cork / In building / Prentice Hall / /

IndustryTerm

detection systems / process mining / invoice-processing item 4c4712 / norm search / security management systems / search/data mining techniques / exhaustive norm search / hardware device / analytics systems / exhaustive search / search algorithm / wireless network connection / pre-processing step / Behavior mining techniques / rudimentary tools / social software application / mining / enterprise systems / subsequent process mining / order processing / web-based order processing system / search efficiency / /

OperatingSystem

Linux / /

Organization

Ireland Science Department / International Monetary Fund / Payment Card Industry Security Standards Council / Computer Lab / Strand / U.S. Securities and Exchange Commission / International Organization for Standardization / IEEE Computer Society / /

Person

Frank / Norm Similarity / Alice / Simon N. Foley / /

Position

manager / auditor / custom Java Security Manager / representative / /

ProgrammingLanguage

Java / DC / /

Technology

search algorithm / Linux / Information technology / API / content management / Java / HTTP / data mining / caching / simulation / /

URL

http /

SocialTag