Login / Signup

Cyber Attacks Detection Using Open Source ELK Stack.

Razvan StoleriuAlin PuncioiuIon Bica
Published in: ECAI (2021)
Keyphrases
  • open source
  • cyber attacks
  • attack detection
  • cyber security
  • anomaly detection
  • data analysis
  • countermeasures
  • critical infrastructure
  • case study
  • source code
  • security policies