Semi-supervised and un-supervised clustering: A review and experimental evaluation

K Taha - Information Systems, 2023 - Elsevier
Retrieving, analyzing, and processing large data can be challenging. An effective and
efficient mechanism for overcoming these challenges is to cluster the data into a compact …

A Survey on the Applications of Semi-supervised Learning to Cyber-security

PK Mvula, P Branco, GV Jourdan, HL Viktor - ACM Computing Surveys, 2024 - dl.acm.org
Machine Learning's widespread application owes to its ability to develop accurate and
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …

[HTML][HTML] System log clustering approaches for cyber security applications: A survey

M Landauer, F Skopik, M Wurzenberger, A Rauber - Computers & Security, 2020 - Elsevier
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …

Ai for it operations (aiops) on cloud platforms: Reviews, opportunities and challenges

Q Cheng, D Sahoo, A Saha, W Yang, C Liu… - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial Intelligence for IT operations (AIOps) aims to combine the power of AI with the big
data generated by IT Operations processes, particularly in cloud infrastructures, to provide …

[HTML][HTML] Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection

M Landauer, M Wurzenberger, F Skopik, G Settanni… - computers & …, 2018 - Elsevier
Technological advances and increased interconnectivity have led to a higher risk of
previously unknown threats. Cyber Security therefore employs Intrusion Detection Systems …

[HTML][HTML] Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security

M Wurzenberger, G Höld, M Landauer, F Skopik - Computers & Security, 2024 - Elsevier
Log lines consist of static parts that characterize their structure and enable assignment of
event types, and event parameters, ie, variable parts that provide specific information on …

Have it your way: Generating customized log datasets with a model-driven simulation testbed

M Landauer, F Skopik, M Wurzenberger… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Evaluations of intrusion detection systems (IDS) require log datasets collected in realistic
system environments. Existing testbeds therefore offer user simulations and attack scenarios …

A survey on forensic investigation of operating system logs

H Studiawan, F Sohel, C Payne - Digital Investigation, 2019 - Elsevier
Event logs are one of the most important sources of digital evidence for forensic
investigation because they record essential activities on the system. In this paper, we …

A Semisupervised Approach for Industrial Anomaly Detection via Self-Adaptive Clustering

X Ma, J Keung, P He, Y Xiao, X Yu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of the Industrial Internet of Things, log-based anomaly detection
has become vital for smart industrial construction that has prompted many researchers to …

[PDF][PDF] Anomaly Detection in Fog Computing: State-of-the-Art Techniques, applications, Challenges, and Future Directions.

G Wali, C Bulla - Library of Progress-Library Science, Information …, 2024 - researchgate.net
The fog computing provides a platform for various time critical real-time applications. It
reduces the communication latency by placing computational resources to near to IoT …