Journal of Telecommunications and Information Technology > 2015 > nr 4 > 30--36
Source
Abstract
Identifiers
journal ISSN : | 1509-4553 |
journal e-ISSN : | 1899-8852 |
Authors
Keywords
Additional information
Publisher
Fields of science
Bibliography
-
[1] Rsyslog - The rocket fast system for log proseccing [Online]. Available: http://www.rsyslog.com
-
[2] K. Kent and M. Souppaya, "Guide to Computer Security Log Management", National Institute of Standards and Technology (NIST) Special Publication 800-92, 2006.
-
[3] K. Julisch and M. Dacier, "Mining intrusion detection alarms for actionable knowledge", in Proc. 8th ACM SIGKDD Int. Conf. Knowl. Discov. Data Mining, Edmonton, Alberta, Canada, 2002, pp. 366-375.