Login / Signup
A Critical Server Security Protection Strategy Based on Traffic Log Analysis.
Haiyong Zhu
Chengyu Wang
Bingnan Hou
Yonghao Tang
Zhiping Cai
Published in:
IAIC (3) (2023)
Keyphrases
</>
log analysis
security protection
user behavior
log data
network security
network traffic
log files
web search engines
search strategy
query logs
user preferences
data mining
web server