Sign in

Methodology for correlations discovery in security logs.

Zdenek MartinasekPetr BlazekPavel SilhavyDavid Smekal
Published in: ICUMT (2017)
Keyphrases