Login / Signup
Cyberattacks detection and analysis in a network log system using XGBoost with ELK stack.
Chao-Tung Yang
Yu-Wei Chan
Jung-Chun Liu
Endah Kristiani
Cing-Han Lai
Published in:
Soft Comput. (2022)
Keyphrases
</>
quantitative analysis
data analysis
databases
artificial neural networks
wireless sensor networks
peer to peer
anomaly detection
database
data mining
artificial intelligence
image analysis
statistical analysis
automatic detection
automatic analysis
forensic analysis