메뉴 건너뛰기




Volumn , Issue , 2014, Pages 687-700

EnCore: Exploiting system environment and correlation information for misconfiguration detection

Author keywords

Configuration; Data mining; Inference

Indexed keywords

CONFIGURATION; ENVIRONMENT INFORMATION; EXECUTION ENVIRONMENTS; EXTRACT INFORMATIONS; INFERENCE; LEARNING CORRELATION; MULTIPLE CONFIGURATIONS; OPERATING ENVIRONMENT;

EID: 84897776863     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2541940.2541983     Document Type: Conference Paper
Times cited : (123)

References (47)
  • 5
    • 84897793675 scopus 로고    scopus 로고
    • Mysql log security. http://www.securityfocus.com/advisories/3803.
    • Mysql Log Security
  • 7
    • 84897813010 scopus 로고    scopus 로고
    • PyLint. http://www.logilab.org/project/pylint/.
    • PyLint
  • 8
    • 84946212876 scopus 로고    scopus 로고
    • RapidMiner. http://www.rapid-i.com.
    • RapidMiner
  • 10
    • 84897748828 scopus 로고    scopus 로고
    • Weka. http://www.cs.waikato.ac.nz/ml/weka.
    • Weka
  • 11
    • 84897774048 scopus 로고    scopus 로고
    • Virtual machine images as structured data: The mirage image library
    • G. Ammons, V. Bala, T. Mummert, D. Reimer, and X. Zhang. Virtual machine images as structured data: the Mirage image library. In HotCloud, 2011.
    • (2011) HotCloud
    • Ammons, G.1    Bala, V.2    Mummert, T.3    Reimer, D.4    Zhang, X.5
  • 36
    • 84940644968 scopus 로고
    • A mathematical theory of communication
    • July
    • C. Shannon. A Mathematical Theory of Communication. The Bell System Technical Journal, 27:379-423, July 1984.
    • (1984) The Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.