A data clustering algorithm for mining patterns from event logs R Vaarandi Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM …, 2003 | 605 | 2003 |
Logcluster-a data clustering and pattern mining algorithm for event logs R Vaarandi, M Pihelgas 2015 11th International conference on network and service management (CNSM), 1-7, 2015 | 253 | 2015 |
SEC-a lightweight event correlation tool R Vaarandi IEEE Workshop on IP Operations and Management, 111-115, 2002 | 147 | 2002 |
A breadth-first algorithm for mining frequent patterns from event logs R Vaarandi International Conference on Intelligence in Communication Systems, 293-308, 2004 | 126 | 2004 |
Mining event logs with slct and loghound R Vaarandi NOMS 2008-2008 IEEE Network Operations and Management Symposium, 1071-1074, 2008 | 117 | 2008 |
Network ids alert classification with frequent itemset mining and data clustering R Vaarandi, K Podiņš 2010 International Conference on Network and Service Management, 451-456, 2010 | 79 | 2010 |
Real-time classification of IDS alerts with data mining techniques R Vaarandi Military Communications Conference, 2009. MILCOM 2009. IEEE, 1786-1792, 2009 | 68 | 2009 |
Tools and Techniques for Event Log Analysis R Vaarandi Tallinn University of Technology, 2005 | 44 | 2005 |
An unsupervised framework for detecting anomalous messages from syslog log files R Vaarandi, B Blumbergs, M Kont NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018 | 42 | 2018 |
Using security logs for collecting and reporting technical security metrics R Vaarandi, M Pihelgas 2014 ieee military communications conference, 294-299, 2014 | 42 | 2014 |
Event log analysis with the LogCluster tool R Vaarandi, M Kont, M Pihelgas MILCOM 2016-2016 IEEE Military Communications Conference, 982-987, 2016 | 32 | 2016 |
Simple Event Correlator for real-time security log monitoring R Vaarandi Hakin9 Magazine 1 (6), 28-39, 2006 | 27 | 2006 |
Simple event correlator-Best practices for creating scalable configurations R Vaarandi, B Blumbergs, E Caliskan Cognitive Methods in Situation Awareness and Decision Support (CogSIMA …, 2015 | 24 | 2015 |
Detecting anomalous network traffic in organizational private networks R Vaarandi 2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2013 | 23 | 2013 |
Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics R Vaarandi, P Niziński 2013 European Conference on Information Warfare and Security, 278-287, 2013 | 19* | 2013 |
Platform independent event correlation tool for network management R Vaarandi NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002 | 19 | 2002 |
Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis B Blumbergs, R Vaarandi MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 707-712, 2017 | 18 | 2017 |
Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels B Blumbergs, M Pihelgas, M Kont, O Maennel, R Vaarandi Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016 | 18 | 2016 |
Efficient event log mining with LogClusterC C Zhuge, R Vaarandi 2017 ieee 3rd international conference on big data security on cloud …, 2017 | 15 | 2017 |
Security Event Processing with Simple Event Correlator R Vaarandi, MR Grimaila Information Systems Security Association Journal 10 (8), 30-37, 2012 | 15* | 2012 |