Login / Signup
Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach.
Hervet Victor
Satoru Kobayashi
Toshihiro Yamauchi
Published in:
CANDARW (2023)
Keyphrases
</>
log analysis
user behavior
log data
web search engines
log files
activity recognition
web search
mobile devices
query logs
search engine
evolutionary algorithm
response time
information retrieval
human activities
database systems
website
search logs