2019
DOI: 10.1007/978-3-030-17277-0_5
|View full text |Cite
|
Sign up to set email alerts
|

Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…We compare three algorithms for the problem. The first two baseline algorithms were proposed in [8]. In addition we introduce a novel algorithm named C--Greedy based on -greedy algorithm for the Budget-Constrained-Dynamic-MAB problem.…”
Section: Sampling Algorithmsmentioning
confidence: 99%
See 4 more Smart Citations
“…We compare three algorithms for the problem. The first two baseline algorithms were proposed in [8]. In addition we introduce a novel algorithm named C--Greedy based on -greedy algorithm for the Budget-Constrained-Dynamic-MAB problem.…”
Section: Sampling Algorithmsmentioning
confidence: 99%
“…In the Gibbs-exploration strategy, suggested by [8], the user probability to be sampled is proportional to the risk estimate.…”
Section: Gibbs-by-riskmentioning
confidence: 99%
See 3 more Smart Citations