Sign in

Identify Potential Attacks from Simulated Log Analysis.

Cinzia BernardeschiAndrea DomeniciFrancesco MercaldoAntonella Santone
Published in: IJCNN (2020)
Keyphrases
  • identify potential
  • log analysis
  • user behavior
  • log data
  • log files
  • web search engines
  • query logs
  • search engine
  • data analysis
  • evolutionary algorithm
  • website
  • knowledge discovery
  • user interaction