Author of the publication

Computer Log Anomaly Detection Using Frequent Episodes.

, , and . AIAI, volume 296 of IFIP Advances in Information and Communication Technology, page 417-422. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finding 3G Mobile Network Cells with Similar Radio Interface Quality Problems., , , and . EANN/AIAI (1), volume 363 of IFIP Advances in Information and Communication Technology, page 392-401. Springer, (2011)Computer Log Anomaly Detection Using Frequent Episodes., , and . AIAI, volume 296 of IFIP Advances in Information and Communication Technology, page 417-422. Springer, (2009)Towards holistic security management through coherent measuring., and . ECSA Companion Volume, page 155-161. ACM, (2010)Local anomaly detection for mobile network monitoring., and . Inf. Sci., 178 (20): 3840-3859 (2008)Anomaly detection and classification using a metric for determining the significance of failures - Case study: mobile network management data from LTE network., and . Neural Comput. Appl., 28 (6): 1265-1275 (2017)A Metric for Determining the Significance of Failures and Its Use in Anomaly Detection - Case Study: Mobile Network Management Data from LTE Network., and . EANN, volume 517 of Communications in Computer and Information Science, page 171-180. Springer, (2015)Towards Trusted Environment in Cloud Monitoring., , and . ITNG, page 180-185. IEEE Computer Society, (2014)A Method for Deriving and Testing Malicious Behavior Detection Rules., and . TrustCom/BigDataSE/ISPA (1), page 1337-1342. IEEE, (2015)What makes expert systems survive over 10 years - empirical evaluation of several engineering applications., , and . Expert Syst. Appl., 24 (2): 199-211 (2003)Analysing 3G radio network performance with fuzzy methods., , , and . Neurocomputing, (2013)