{"_id":"rS5isnqmDzREjvtjC","bibbaseid":"lakha-mount-serra-cuzzocrea-anomalydetectionincybersecurityeventsthroughgraphneuralnetworkandtransformerbasedmodelacasestudywithbethdataset-2022","author_short":["Lakha, B.","Mount, S. L.","Serra, E.","Cuzzocrea, A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Bishal"],"propositions":[],"lastnames":["Lakha"],"suffixes":[]},{"firstnames":["Sara","Lilly"],"propositions":[],"lastnames":["Mount"],"suffixes":[]},{"firstnames":["Edoardo"],"propositions":[],"lastnames":["Serra"],"suffixes":[]},{"firstnames":["Alfredo"],"propositions":[],"lastnames":["Cuzzocrea"],"suffixes":[]}],"title":"Anomaly Detection in Cybersecurity Events Through Graph Neural Network and Transformer Based Model: A Case Study with BETH Dataset","booktitle":"IEEE International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022","pages":"5756–5764","year":"2022","crossref":"DBLP:conf/bigdataconf/2022","url":"https://doi.org/10.1109/BigData55660.2022.10020336","doi":"10.1109/BIGDATA55660.2022.10020336","timestamp":"Fri, 18 Aug 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/bigdataconf/LakhaMSC22.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/bigdataconf/LakhaMSC22,\n author = {Bishal Lakha and\n Sara Lilly Mount and\n Edoardo Serra and\n Alfredo Cuzzocrea},\n title = {Anomaly Detection in Cybersecurity Events Through Graph Neural Network\n and Transformer Based Model: {A} Case Study with {BETH} Dataset},\n booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka,\n Japan, December 17-20, 2022},\n pages = {5756--5764},\n year = {2022},\n crossref = {DBLP:conf/bigdataconf/2022},\n url = {https://doi.org/10.1109/BigData55660.2022.10020336},\n doi = {10.1109/BIGDATA55660.2022.10020336},\n timestamp = {Fri, 18 Aug 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/bigdataconf/LakhaMSC22.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Lakha, B.","Mount, S. L.","Serra, E.","Cuzzocrea, A."],"key":"DBLP:conf/bigdataconf/LakhaMSC22","id":"DBLP:conf/bigdataconf/LakhaMSC22","bibbaseid":"lakha-mount-serra-cuzzocrea-anomalydetectionincybersecurityeventsthroughgraphneuralnetworkandtransformerbasedmodelacasestudywithbethdataset-2022","role":"author","urls":{"Paper":"https://doi.org/10.1109/BigData55660.2022.10020336"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/s/Serra:Edoardo","dataSources":["7rWgxyuseebjFdqAR"],"keywords":[],"search_terms":["anomaly","detection","cybersecurity","events","through","graph","neural","network","transformer","based","model","case","study","beth","dataset","lakha","mount","serra","cuzzocrea"],"title":"Anomaly Detection in Cybersecurity Events Through Graph Neural Network and Transformer Based Model: A Case Study with BETH Dataset","year":2022}