Login / Signup

HOUND: Log Analysis Support for Threat Hunting by Log Visualization.

Rei YamagishiTakahiro KatayamaNobutaka KawaguchiTomohiro Shigemoto
Published in: IIAI-AAI (2022)
Keyphrases
  • log analysis
  • log data
  • user behavior
  • log files
  • evolutionary algorithm
  • query logs
  • domain knowledge
  • end users
  • search engine
  • database systems