Login / Signup
Evolving computer intrusion scripts for vulnerability assessment and log analysis.
Julien Budynek
Eric Bonabeau
Ben Shargel
Published in:
GECCO (2005)
Keyphrases
</>
log analysis
user behavior
log data
risk assessment
log files
intrusion detection
web search engines
intrusion detection system
query logs
search engine
anomaly detection
web search
network security
expert systems
data mining
data warehouse
data sources