Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies 2016
DOI: 10.1145/3006299.3006336
|View full text |Cite
|
Sign up to set email alerts
|

Survey of data intensive computing technologies application to to security log data management

Abstract: Data intensive computing research and technology developments offer the potential of providing significant improvements in several security log management challenges. Approaches to address the complexity, timeliness, expense, diversity, and noise issues have been identified. These improvements are motivated by the increasingly important role of analytics. Machine learning and expert systems that incorporate attack patterns are providing greater detection insights. Finding actionable indicators requires the ana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 13 publications
0
0
0
Order By: Relevance