Cited By
View all- Cersosimo MLara A(2022)Detecting Malicious Domains using the Splunk Machine Learning ToolkitNOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS54207.2022.9789899(1-6)Online publication date: 25-Apr-2022
- Au VThomas PJayasinghe G(2016)Query-Biased Summaries for Tabular DataProceedings of the 21st Australasian Document Computing Symposium10.1145/3015022.3015027(69-72)Online publication date: 5-Dec-2016
- Alspaugh SChen BLin JGanapathi AHearst MKatz RVelasquez N(2014)Analyzing log analysisProceedings of the 28th USENIX conference on Large Installation System Administration10.5555/2717491.2717495(53-68)Online publication date: 9-Nov-2014