Login / Signup

Malicious Process Identification via System Audit Logs Analysis.

Zeri ZhangKai ShiMengshu WangAnxing Jiang
Published in: ICBASE (2023)
Keyphrases
  • databases
  • neural network
  • information retrieval
  • image analysis
  • statistical analysis
  • social networks
  • website
  • face recognition
  • hidden markov models
  • quantitative analysis