Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Heuristics
biblio
Towards a neural language model for signature extraction from forensic logs
Submitted by K_Hooper on Wed, 01/10/2018 - 11:14am
natural language text
use cases
text analysis
Software
signature extraction frameworks
Scalability
rule-based systems
rule-based approaches
Resiliency
pubcrawl
Predictive models
pattern clustering
nonmutable part identification
Neural networks
neural nets
neural language model
Clustering algorithms
natural language processing
log message
log line clustering
learning (artificial intelligence)
knowledge based systems
Human behavior
Heuristics
handcrafted algorithms
Forensics
forensic log analysis
error-prone
Digital Forensics
data analysis
complex relationship learning
biblio
Multi-hard Problems in Uncertain Environment
Submitted by grigby1 on Fri, 10/27/2017 - 12:02pm
Metrics
pubcrawl
co-evolution
Heuristics
metaheuristics
Multi-Objective Optimization
non-separable problems
real-world optimization problems
traveling thief problem
supply chain risk assessment
biblio
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
information quality
Workstations
Servers
pubcrawl170112
proxy
normal data streams
network-based attack
mining
malwares
malware
logs
large-scale proxy log mining
invasive software
internet
information quantity
abnormal data streams
Heuristics
feature pattern
feature extraction
digital signatures
Data mining
computer network security
computer network behavioral analysis
Cloud Computing
C and C Servers
botnet life cycle
botnet detection methods
botnet
algorithmically generated domains
AGD
file
Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events
Submitted by Laurie Williams on Wed, 04/29/2015 - 11:18am. Contributors:
Jason King
Rahul Pandita
Laurie Williams
Science of Security
Foundations
privacy
Forensics
Heuristics
HotSoS 2015
Academia
Presentation
Presentations
« first
‹ previous
1
2