Login / Signup

Retrieving knowledge from auditing log-files for computer and network forensics and accountability.

Daisuke TakahashiYang Xiao
Published in: Secur. Commun. Networks (2008)
Keyphrases