Login / Signup
Potential threats mining methods based on correlation analysis of multi-type logs.
Tao Qin
Yuli Gao
Lingyan Wei
Zhaoli Liu
Chenxu Wang
Published in:
IET Networks (2018)
Keyphrases
</>
correlation analysis
data mining techniques
database
data sets
databases
model selection
statistical methods
multi type