LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling
Author
Abstract
Suggested Citation
DOI: 10.1007/s10796-020-10026-3
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Tamal Mondal & Prithviraj Pramanik & Indrajit Bhattacharya & Naiwrita Boral & Saptarshi Ghosh, 2018. "Analysis and Early Detection of Rumors in a Post Disaster Scenario," Information Systems Frontiers, Springer, vol. 20(5), pages 961-979, October.
- Shaio Yan Huang & Chi-Chen Lin & An-An Chiu & David C. Yen, 0. "Fraud detection using fraud triangle risk factors," Information Systems Frontiers, Springer, vol. 0, pages 1-14.
- Abir Troudi & Corinne Amel Zayani & Salma Jamoussi & Ikram Amous Ben Amor, 2018. "A New Mashup Based Method for Event Detection from Social Media," Information Systems Frontiers, Springer, vol. 20(5), pages 981-992, October.
- Shaio Yan Huang & Chi-Chen Lin & An-An Chiu & David C. Yen, 2017. "Fraud detection using fraud triangle risk factors," Information Systems Frontiers, Springer, vol. 19(6), pages 1343-1356, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Shouhuai Xu & Moti Yung & Jingguo Wang, 2021. "Seeking Foundations for the Science of Cyber Security," Information Systems Frontiers, Springer, vol. 23(2), pages 263-267, April.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Bin Xia & Yuxuan Bai & Junjie Yin & Yun Li & Jian Xu, 2021. "LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling," Information Systems Frontiers, Springer, vol. 23(2), pages 285-298, April.
- Citra Sukmadilaga & Srihadi Winarningsih & Tri Handayani & Eva Herianti & Erlane K Ghani, 2022. "Fraudulent Financial Reporting in Ministerial and Governmental Institutions in Indonesia: An Analysis Using Hexagon Theory," Economies, MDPI, vol. 10(4), pages 1-14, April.
- Saptarshi Ghosh & Kripabandhu Ghosh & Debasis Ganguly & Tanmoy Chakraborty & Gareth J. F. Jones & Marie-Francine Moens & Muhammad Imran, 2018. "Exploitation of Social Media for Emergency Relief and Preparedness: Recent Research and Trends," Information Systems Frontiers, Springer, vol. 20(5), pages 901-907, October.
- Chen Wang & Jack Strauss & Lei Zheng, 2021. "High-Speed Railway Opening and Corporate Fraud," Sustainability, MDPI, vol. 13(23), pages 1-23, December.
- Christian Hauser, 2019. "Fighting Against Corruption: Does Anti-corruption Training Make Any Difference?," Journal of Business Ethics, Springer, vol. 159(1), pages 281-299, September.
- Kuntara Pukthuanthong & Saif Ullah & Thomas J. Walker & Xuan Wu, 2017. "Timely vs. delayed CEO turnover," Information Systems Frontiers, Springer, vol. 19(3), pages 469-479, June.
- Shihang Wang & Zongmin Li & Yuhong Wang & Qi Zhang, 2019. "Machine Learning Methods to Predict Social Media Disaster Rumor Refuters," IJERPH, MDPI, vol. 16(8), pages 1-16, April.
- Xiaohui Zhang & Qianzhou Du & Zhongju Zhang, 2022. "A theory‐driven machine learning system for financial disinformation detection," Production and Operations Management, Production and Operations Management Society, vol. 31(8), pages 3160-3179, August.
- Milad Mirbabaie & Deborah Bunker & Stefan Stieglitz & Annika Deubel, 0. "Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication," Information Systems Frontiers, Springer, vol. 0, pages 1-13.
- Douglas Cumming & Sofia Johan & Denis Schweizer, 2017. "Information systems, agency problems, and fraud," Information Systems Frontiers, Springer, vol. 19(3), pages 421-424, June.
- Jyoti Prakash Singh & Abhinav Kumar & Nripendra P. Rana & Yogesh K. Dwivedi, 2022. "Attention-Based LSTM Network for Rumor Veracity Estimation of Tweets," Information Systems Frontiers, Springer, vol. 24(2), pages 459-474, April.
- Petr Hajek & Mohammad Zoynul Abedin & Uthayasankar Sivarajah, 2023. "Fraud Detection in Mobile Payment Systems using an XGBoost-based Framework," Information Systems Frontiers, Springer, vol. 25(5), pages 1985-2003, October.
- Milad Mirbabaie & Deborah Bunker & Stefan Stieglitz & Annika Deubel, 2020. "Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication," Information Systems Frontiers, Springer, vol. 22(2), pages 339-351, April.
- Shalak Mendon & Pankaj Dutta & Abhishek Behl & Stefan Lessmann, 2021. "A Hybrid Approach of Machine Learning and Lexicons to Sentiment Analysis: Enhanced Insights from Twitter Data of Natural Disasters," Information Systems Frontiers, Springer, vol. 23(5), pages 1145-1168, September.
- Rong Liu & Jujun Huang & Zhongju Zhang, 2023. "Tracking disclosure change trajectories for financial fraud detection," Production and Operations Management, Production and Operations Management Society, vol. 32(2), pages 584-602, February.
- A. Geethapriya & S. Valli, 2021. "An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis," Information Systems Frontiers, Springer, vol. 23(3), pages 791-805, June.
- Kuntara Pukthuanthong & Saif Ullah & Thomas J. Walker & Xuan Wu, 0. "Timely vs. delayed CEO turnover," Information Systems Frontiers, Springer, vol. 0, pages 1-11.
- Ziwei Wang & Chunfeng Wang & Zhenming Fang, 2023. "Common institutional ownership and corporate misconduct," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 44(1), pages 102-136, January.
- Zu, Xu & Diao, Xinyi & Meng, Zhiyi, 2019. "The impact of social media input intensity on firm performance: Evidence from Sina Weibo," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 536(C).
- Liting Li & Haichao Zheng & Dongyu Chen & Bin Zhu, 2024. "Whose reviews are most valuable for predicting the default risk of peer-to-peer lending platforms? Evidence from China," Electronic Commerce Research, Springer, vol. 24(3), pages 1619-1658, September.
More about this item
Keywords
Anomaly detection; Generative adversarial network; Log-level anomaly; Permutation event modeling;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v::y::i::d:10.1007_s10796-020-10026-3. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.