Login / Signup

Potential threats mining methods based on correlation analysis of multi-type logs.

Tao QinYuli GaoLingyan WeiZhaoli LiuChenxu Wang
Published in: IET Networks (2018)
Keyphrases
  • correlation analysis
  • data mining techniques
  • database
  • data sets
  • databases
  • model selection
  • statistical methods
  • multi type