Login / Signup
HOUND: Log Analysis Support for Threat Hunting by Log Visualization.
Rei Yamagishi
Takahiro Katayama
Nobutaka Kawaguchi
Tomohiro Shigemoto
Published in:
IIAI-AAI (2022)
Keyphrases
</>
log analysis
log data
user behavior
log files
evolutionary algorithm
query logs
domain knowledge
end users
search engine
database systems