• No results found

Discovering and Utilising Expert Knowledge from Security Event Logs

N/A
N/A
Protected

Academic year: 2021

Share "Discovering and Utilising Expert Knowledge from Security Event Logs"

Copied!
177
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 3.1: Summarised steps of proposed automated knowledge acquisition process, where same coloured components belong to a single step.
Figure 3.2: A visual time line representation of D covering a time span of 20 seconds.
Figure 3.3: A live entry of event type, 5447, acquired using the Event Viewer appli- appli-cation of a Microsoft system
Table 3.1: Example of converting temporal-association rules to a DAG by removing conflicts, duplicates and cycles.
+7

References

Related documents

As seen in Table (10), there are statistically significant differences for the level of job satisfaction among the faculty members in accordance to the variable of university,

Bental and Demougin (2010) explain the decreasing labor share by an institutional model where the downward movements the labor share, wages relative to productivity and effective

According to the ASEAN Free Trade Agreement (AFTA), Cambodia has approved the importation tariff duty of 5 percent on some of the IT related products but the implementation of

EdL 467-D10 Supervision and Professional Development (global online masters) 3 Sperandio online EdL 467-D11 Supervision and Professional Development (global online doctoral)

We now believe that in addition to the decreased volume of bone that is formed in each bone multicellular unit during aging, 42 the re- duced formation of periosteal bone

Europe: North Europe and mountains of Central and South Europe, North America, North Africa (Anon., 2001), Asia: Turkey (Demirel & al., 2003)..

The fractional breakdown of the recent world production of the various fiber types shows that the industrial applications of asbestos fibers have now shifted almost exclusively