Login / Signup
Audit logs: to keep or not to keep?
Christopher Wee
Published in:
Recent Advances in Intrusion Detection (1999)
Keyphrases
</>
intrusion detection
data mining techniques
quality assurance
log analysis
preprocessing
log data
real time
information systems
multi agent systems
expert systems
log files
user activity
context aware preferences