Login / Signup

A Critical Server Security Protection Strategy Based on Traffic Log Analysis.

Haiyong ZhuChengyu WangBingnan HouYonghao TangZhiping Cai
Published in: IAIC (3) (2023)
Keyphrases
  • log analysis
  • security protection
  • user behavior
  • log data
  • network security
  • network traffic
  • log files
  • web search engines
  • search strategy
  • query logs
  • user preferences
  • data mining
  • web server