Login / Signup
On Applying Graph Database Time Models for Security Log Analysis.
Daniel Hofer
Markus Jäger
Aya Khaled Youssef Sayed Mohamed
Josef Küng
Published in:
FDSE (2020)
Keyphrases
</>
log analysis
graph databases
probabilistic model
data mining
query logs
multi dimensional
user behavior
graph mining