Open Access
Issue
ITM Web Conf.
Volume 74, 2025
International Conference on Contemporary Pervasive Computational Intelligence (ICCPCI-2024)
Article Number 02002
Number of page(s) 8
Section Cybersecurity, Networks, and Computing Technologies
DOI https://doi.org/10.1051/itmconf/20257402002
Published online 20 February 2025
  1. Denning, Dorothy E. “An intrusion-detection model.” IEEE Transactions on software engineering 2 (1987): 222–232. [CrossRef] [Google Scholar]
  2. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000, October). Distributed denial of service attacks. In Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics.’cybernetics evolving to systems, humans, organizations, and their complex interactions’cat. no. 0 (Vol. 3, pp. 2275–2280). IEEE [Google Scholar]
  3. Radai, Yisrael. “The israeli pc virus.” Computers & Security 8.2 (1989): 111–113. [CrossRef] [Google Scholar]
  4. Samuel, Arthur L. “Some studies in machine learning using the game of checkers.” IBM Journal of research and development 3.3 (1959): 210–229. [CrossRef] [Google Scholar]
  5. Liu, F. T., Ting, K. M., & Zhou, Z. H. (2008, December). Isolation forest. In 2008 eighth IEEE International conference on data mining (pp. 413–422). IEEE. [CrossRef] [Google Scholar]
  6. Mostafa, A. M., Altheneyan, A., Alnuaim, A., & Alhadlaq, A. (2023). Hybrid ML- Based Technique to Classify Malicious Activity Using Log Data of Systems. Applied Sciences, 13(4), 2707. [CrossRef] [Google Scholar]
  7. Hussein, Salam Allawi, and Sándor R. Répás. “Anomaly Detection in Log Files Based on Machine Learning Techniques.” Journal of Electrical Systems 20.3s (2024): 1299–1311. [Google Scholar]
  8. Wu, Xudong. “Review of Anomaly Detection Based on Log Analysis.” International [Google Scholar]
  9. Zhu, Jieming, et al. “Loghub: A large collection of system log datasets for ai-driven log analytics.” 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2023. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.