Cited By
View all- Komadina AKovačević IŠtengl BGroš S(2024)Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack DetectionSensors10.3390/s2408263624:8(2636)Online publication date: 20-Apr-2024
- Domnik JHolland A(2024)On Data Leakage Prevention Maturity: Adapting the C2M2 FrameworkJournal of Cybersecurity and Privacy10.3390/jcp40200094:2(167-195)Online publication date: 30-Mar-2024
- Wang YZhu ZFu QMa YHe PFilkov VRay BZhou M(2024)MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal DataProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695485(1057-1068)Online publication date: 27-Oct-2024
- Show More Cited By