Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. Yen, T., Oprea, A., Onarlioglu, K., Leetham, T., Robertson, W., Juels, A., & Kirda, E. In Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13, pages 199–208, New Orleans, Louisiana, 2013. ACM Press.
Paper doi bibtex @inproceedings{yen_beehive:_2013,
address = {New Orleans, Louisiana},
title = {Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks},
isbn = {978-1-4503-2015-3},
shorttitle = {Beehive},
url = {http://dl.acm.org/citation.cfm?doid=2523649.2523670},
doi = {10.1145/2523649.2523670},
language = {en},
urldate = {2019-01-28},
booktitle = {Proceedings of the 29th {Annual} {Computer} {Security} {Applications} {Conference} on - {ACSAC} '13},
publisher = {ACM Press},
author = {Yen, Ting-Fang and Oprea, Alina and Onarlioglu, Kaan and Leetham, Todd and Robertson, William and Juels, Ari and Kirda, Engin},
year = {2013},
pages = {199--208},
}
Downloads: 0
{"_id":"zCGWPcnJWnSc5JKnD","bibbaseid":"yen-oprea-onarlioglu-leetham-robertson-juels-kirda-beehivelargescaleloganalysisfordetectingsuspiciousactivityinenterprisenetworks-2013","downloads":0,"creationDate":"2015-12-10T07:19:21.201Z","title":"Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks","author_short":["Yen, T.","Oprea, A.","Onarlioglu, K.","Leetham, T.","Robertson, W.","Juels, A.","Kirda, E."],"year":2013,"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/tpmobley","bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"New Orleans, Louisiana","title":"Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks","isbn":"978-1-4503-2015-3","shorttitle":"Beehive","url":"http://dl.acm.org/citation.cfm?doid=2523649.2523670","doi":"10.1145/2523649.2523670","language":"en","urldate":"2019-01-28","booktitle":"Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13","publisher":"ACM Press","author":[{"propositions":[],"lastnames":["Yen"],"firstnames":["Ting-Fang"],"suffixes":[]},{"propositions":[],"lastnames":["Oprea"],"firstnames":["Alina"],"suffixes":[]},{"propositions":[],"lastnames":["Onarlioglu"],"firstnames":["Kaan"],"suffixes":[]},{"propositions":[],"lastnames":["Leetham"],"firstnames":["Todd"],"suffixes":[]},{"propositions":[],"lastnames":["Robertson"],"firstnames":["William"],"suffixes":[]},{"propositions":[],"lastnames":["Juels"],"firstnames":["Ari"],"suffixes":[]},{"propositions":[],"lastnames":["Kirda"],"firstnames":["Engin"],"suffixes":[]}],"year":"2013","pages":"199–208","bibtex":"@inproceedings{yen_beehive:_2013,\n\taddress = {New Orleans, Louisiana},\n\ttitle = {Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks},\n\tisbn = {978-1-4503-2015-3},\n\tshorttitle = {Beehive},\n\turl = {http://dl.acm.org/citation.cfm?doid=2523649.2523670},\n\tdoi = {10.1145/2523649.2523670},\n\tlanguage = {en},\n\turldate = {2019-01-28},\n\tbooktitle = {Proceedings of the 29th {Annual} {Computer} {Security} {Applications} {Conference} on - {ACSAC} '13},\n\tpublisher = {ACM Press},\n\tauthor = {Yen, Ting-Fang and Oprea, Alina and Onarlioglu, Kaan and Leetham, Todd and Robertson, William and Juels, Ari and Kirda, Engin},\n\tyear = {2013},\n\tpages = {199--208},\n}\n\n","author_short":["Yen, T.","Oprea, A.","Onarlioglu, K.","Leetham, T.","Robertson, W.","Juels, A.","Kirda, E."],"key":"yen_beehive:_2013","id":"yen_beehive:_2013","bibbaseid":"yen-oprea-onarlioglu-leetham-robertson-juels-kirda-beehivelargescaleloganalysisfordetectingsuspiciousactivityinenterprisenetworks-2013","role":"author","urls":{"Paper":"http://dl.acm.org/citation.cfm?doid=2523649.2523670"},"downloads":0},"search_terms":["beehive","large","scale","log","analysis","detecting","suspicious","activity","enterprise","networks","yen","oprea","onarlioglu","leetham","robertson","juels","kirda"],"keywords":["dblp"],"authorIDs":[],"dataSources":["6KYEtpSuENpSn3KKK"]}