Risto Vaarandi

Orcid: 0000-0001-7781-5863

According to our database1, Risto Vaarandi authored at least 18 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking.
IEEE Access, 2023

Comparative Analysis of Pattern Mining Algorithms for Event Logs.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
How to Build a SOC on a Budget.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
A Stream Clustering Algorithm for Classifying Network IDS Alerts.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2018
An unsupervised framework for detecting anomalous messages from syslog log files.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

2017
Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

2016
Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Event log analysis with the LogCluster tool.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Simple event correlator - Best practices for creating scalable configurations.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2015

LogCluster - A data clustering and pattern mining algorithm for event logs.
Proceedings of the 11th International Conference on Network and Service Management, 2015

2014
Using Security Logs for Collecting and Reporting Technical Security Metrics.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2013
Detecting anomalous network traffic in organizational private networks.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2013

2010
Network IDS alert classification with frequent itemset mining and data clustering.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2008
Mining event logs with SLCT and LogHound.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

2004
A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs.
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004

2003
A Clustering Algorithm for Logfile Data Sets.
Proceedings of the Eighth Symposium on Programming Languages and Software Tools, 2003

2002
Platform Independent Tool for Local Event Correlation.
Acta Cybern., 2002

Platform independent event correlation tool for network management.
Proceedings of the Management Solutions for the New Communications World, 2002


  Loading...