Follow
Risto Vaarandi
Risto Vaarandi
Centre for Digital Forensics and Cyber Security, Tallinn University of Technology
Verified email at ttu.ee - Homepage
Title
Cited by
Cited by
Year
A data clustering algorithm for mining patterns from event logs
R Vaarandi
Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM …, 2003
6052003
Logcluster-a data clustering and pattern mining algorithm for event logs
R Vaarandi, M Pihelgas
2015 11th International conference on network and service management (CNSM), 1-7, 2015
2532015
SEC-a lightweight event correlation tool
R Vaarandi
IEEE Workshop on IP Operations and Management, 111-115, 2002
1472002
A breadth-first algorithm for mining frequent patterns from event logs
R Vaarandi
International Conference on Intelligence in Communication Systems, 293-308, 2004
1262004
Mining event logs with slct and loghound
R Vaarandi
NOMS 2008-2008 IEEE Network Operations and Management Symposium, 1071-1074, 2008
1172008
Network ids alert classification with frequent itemset mining and data clustering
R Vaarandi, K Podiņš
2010 International Conference on Network and Service Management, 451-456, 2010
792010
Real-time classification of IDS alerts with data mining techniques
R Vaarandi
Military Communications Conference, 2009. MILCOM 2009. IEEE, 1786-1792, 2009
682009
Tools and Techniques for Event Log Analysis
R Vaarandi
Tallinn University of Technology, 2005
442005
An unsupervised framework for detecting anomalous messages from syslog log files
R Vaarandi, B Blumbergs, M Kont
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018
422018
Using security logs for collecting and reporting technical security metrics
R Vaarandi, M Pihelgas
2014 ieee military communications conference, 294-299, 2014
422014
Event log analysis with the LogCluster tool
R Vaarandi, M Kont, M Pihelgas
MILCOM 2016-2016 IEEE Military Communications Conference, 982-987, 2016
322016
Simple Event Correlator for real-time security log monitoring
R Vaarandi
Hakin9 Magazine 1 (6), 28-39, 2006
272006
Simple event correlator-Best practices for creating scalable configurations
R Vaarandi, B Blumbergs, E Caliskan
Cognitive Methods in Situation Awareness and Decision Support (CogSIMA …, 2015
242015
Detecting anomalous network traffic in organizational private networks
R Vaarandi
2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2013
232013
Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics
R Vaarandi, P Niziński
2013 European Conference on Information Warfare and Security, 278-287, 2013
19*2013
Platform independent event correlation tool for network management
R Vaarandi
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
192002
Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis
B Blumbergs, R Vaarandi
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 707-712, 2017
182017
Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels
B Blumbergs, M Pihelgas, M Kont, O Maennel, R Vaarandi
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
182016
Efficient event log mining with LogClusterC
C Zhuge, R Vaarandi
2017 ieee 3rd international conference on big data security on cloud …, 2017
152017
Security Event Processing with Simple Event Correlator
R Vaarandi, MR Grimaila
Information Systems Security Association Journal 10 (8), 30-37, 2012
15*2012
The system can't perform the operation now. Try again later.
Articles 1–20