no code implementations • 10 Feb 2021 • Nidhi Rastogi, Qicheng Ma
For this, system logs are modeled as a natural language sequence and patterns are extracted from these sequences.
no code implementations • 10 Feb 2021 • Sharmishtha Dutta, Nidhi Rastogi, Destin Yee, Chuqiao Gu, Qicheng Ma
Cyber threat and attack intelligence information are available in non-standard format from heterogeneous sources.