Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. Yen, T., Oprea, A., Onarlioglu, K., Leetham, T., Robertson, W., Juels, A., & Kirda, E. In Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13, pages 199–208, New Orleans, Louisiana, 2013. ACM Press.
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks [link]Paper  doi  bibtex   
@inproceedings{yen_beehive:_2013,
	address = {New Orleans, Louisiana},
	title = {Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks},
	isbn = {978-1-4503-2015-3},
	shorttitle = {Beehive},
	url = {http://dl.acm.org/citation.cfm?doid=2523649.2523670},
	doi = {10.1145/2523649.2523670},
	language = {en},
	urldate = {2019-01-28},
	booktitle = {Proceedings of the 29th {Annual} {Computer} {Security} {Applications} {Conference} on - {ACSAC} '13},
	publisher = {ACM Press},
	author = {Yen, Ting-Fang and Oprea, Alina and Onarlioglu, Kaan and Leetham, Todd and Robertson, William and Juels, Ari and Kirda, Engin},
	year = {2013},
	pages = {199--208},
}

Downloads: 0