Login / Signup
Malicious Process Identification via System Audit Logs Analysis.
Zeri Zhang
Kai Shi
Mengshu Wang
Anxing Jiang
Published in:
ICBASE (2023)
Keyphrases
</>
databases
neural network
information retrieval
image analysis
statistical analysis
social networks
website
face recognition
hidden markov models
quantitative analysis