Cited By
View all- Fei KZhou JZhou YGu XFan HLi BWang WChen Y(2025)LaAeb: A comprehensive log-text analysis based approach for insider threat detectionComputers & Security10.1016/j.cose.2024.104126148(104126)Online publication date: Jan-2025
- Zhang CShen WWang SWu Y(2024)Network Anomaly Detection Algorithm Based on Fusion of Artificial Fish Swarming and Isolation Forest2024 5th International Conference on Computer Engineering and Application (ICCEA)10.1109/ICCEA62105.2024.10603987(238-242)Online publication date: 12-Apr-2024
- Phelps CLahiry AIslam TPouchard L(2024)Reimagine Application Performance as a Graph: Novel Graph-Based Method for Performance Anomaly Classification in High-Performance Computing2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC61105.2024.00041(240-245)Online publication date: 2-Jul-2024
- Show More Cited By