Risto Vaarandi
Risto Vaarandi
Centre for Digital Forensics and Cyber Security, Tallinn University of Technology
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
A data clustering algorithm for mining patterns from event logs
R Vaarandi
Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM …, 2003
Logcluster-a data clustering and pattern mining algorithm for event logs
R Vaarandi, M Pihelgas
2015 11th International conference on network and service management (CNSM), 1-7, 2015
SEC-a lightweight event correlation tool
R Vaarandi
IEEE Workshop on IP Operations and Management, 111-115, 2002
A breadth-first algorithm for mining frequent patterns from event logs
R Vaarandi
International Conference on Intelligence in Communication Systems, 293-308, 2004
Mining event logs with slct and loghound
R Vaarandi
NOMS 2008-2008 IEEE Network Operations and Management Symposium, 1071-1074, 2008
Network ids alert classification with frequent itemset mining and data clustering
R Vaarandi, K Podiņš
2010 International Conference on Network and Service Management, 451-456, 2010
Real-time classification of IDS alerts with data mining techniques
R Vaarandi
Military Communications Conference, 2009. MILCOM 2009. IEEE, 1786-1792, 2009
Tools and Techniques for Event Log Analysis
R Vaarandi
Tallinn University of Technology, 2005
Using security logs for collecting and reporting technical security metrics
R Vaarandi, M Pihelgas
2014 ieee military communications conference, 294-299, 2014
An unsupervised framework for detecting anomalous messages from syslog log files
R Vaarandi, B Blumbergs, M Kont
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018
Event log analysis with the LogCluster tool
R Vaarandi, M Kont, M Pihelgas
MILCOM 2016-2016 IEEE Military Communications Conference, 982-987, 2016
Simple Event Correlator for real-time security log monitoring
R Vaarandi
Hakin9 Magazine 1 (6), 28-39, 2006
Simple event correlator-Best practices for creating scalable configurations
R Vaarandi, B Blumbergs, E Caliskan
Cognitive Methods in Situation Awareness and Decision Support (CogSIMA …, 2015
Detecting anomalous network traffic in organizational private networks
R Vaarandi
2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2013
Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
B Blumbergs, R Vaarandi
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 707-712, 2017
Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics
R Vaarandi, P Niziński
2013 European Conference on Information Warfare and Security, 278-287, 2013
Platform independent event correlation tool for network management
R Vaarandi
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels
B Blumbergs, M Pihelgas, M Kont, O Maennel, R Vaarandi
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
Security Event Processing with Simple Event Correlator
R Vaarandi, MR Grimaila
Information Systems Security Association Journal 10 (8), 30-37, 2012
Efficient event log mining with LogClusterC
C Zhuge, R Vaarandi
2017 ieee 3rd international conference on big data security on cloud …, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20