Login / Signup
Fast attack detection system using log analysis and attack tree generation.
Duhoe Kim
Yong-Hyun Kim
Dongil Shin
Dongkyoo Shin
Published in:
Clust. Comput. (2019)
Keyphrases
</>
attack detection
log analysis
multistage
log data
user behavior
intrusion detection system
attack scenarios
log files
cyber attacks
web search engines
query logs
intrusion detection
computer systems
web search
search engine
search logs
search behavior
product recommendation
access control