all InfoSec news
Assessing Anonymized System Logs Usefulness for Behavioral Analysis in RNN Models. (arXiv:2212.01101v1 [cs.LG])
Dec. 5, 2022, 2:10 a.m. | Tom Richard Vargis, Siavash Ghiasvand
cs.CR updates on arXiv.org arxiv.org
System logs are a common source of monitoring data for analyzing computing
systems' behavior. Due to the complexity of modern computing systems and the
large size of collected monitoring data, automated analysis mechanisms are
required. Numerous machine learning and deep learning methods are proposed to
address this challenge. However, due to the existence of sensitive data in
system logs their analysis and storage raise serious privacy concerns.
Anonymization methods could be used to clean the monitoring data before
analysis. However, …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Technical Writer Cybersecurity (Clearance Required)
@ ICF | Virginia Client Office (VA88)
Threat Management & Intelligence Expert (m/f/d)
@ METRO/MAKRO | Düsseldorf, Germany
IT Security Manager
@ Deutsche Telekom IT Solutions Slovakia | Košice, Slovakia (Slovak Republic)