tag:blogger.com,1999:blog-5048643098278177070.post8737192728607156449..comments2024-03-28T05:30:22.680-04:00Comments on System Management by Exception: Is Anomaly Detection Similar to Exception Detection? Apply SEDS for Information Security!Igor Trubinhttp://www.blogger.com/profile/17758940374397545163noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-5048643098278177070.post-77644433487859355832013-04-11T16:23:45.248-04:002013-04-11T16:23:45.248-04:00____________________________
UPDATE: see other re...____________________________<br /><br />UPDATE: see other related posts:<br /><br /><br /><br />Not a MASF Based Statistical Techniques (Entropy-based) for Anomaly Detection in Data Centers (http://itrubin.blogspot.com/2012/10/not-masf-based-statistical-techniques.html)<br /><br /><br /><br />Quantifying Imbalance in Computer Systems: CMG'11 Trip Report, Part 2 (http://itrubin.blogspot.com/2012/01/quantifying-imbalance-in-computer.html)<br /><br />Igor Trubinhttps://www.blogger.com/profile/17758940374397545163noreply@blogger.com