Login / Signup
AClog: Attack Chain Construction Based on Log Correlation.
Teng Li
Jianfeng Ma
Qingqi Pei
Yulong Shen
Chi Lin
Siqi Ma
Mohammad S. Obaidat
Published in:
GLOBECOM (2019)
Keyphrases
</>
alert correlation
correlation coefficient
attack graphs
database
website
search algorithm
lightweight
log files
highly correlated
countermeasures
secret key
positively correlated
attack graph