Login / Signup

Time-Scoped Searching of Encrypted Audit Logs.

Darren DavisFabian MonroseMichael K. Reiter
Published in: ICICS (2004)
Keyphrases
  • intrusion detection
  • data structure
  • encryption key
  • real time
  • neural network
  • machine learning
  • artificial intelligence
  • e learning
  • metadata
  • relational databases
  • search strategies
  • closed world