Login / Signup

On Applying Graph Database Time Models for Security Log Analysis.

Daniel HoferMarkus JägerAya Khaled Youssef Sayed MohamedJosef Küng
Published in: FDSE (2020)
Keyphrases
  • log analysis
  • graph databases
  • probabilistic model
  • data mining
  • query logs
  • multi dimensional
  • user behavior
  • graph mining