Sign in
Identify Potential Attacks from Simulated Log Analysis.
Cinzia Bernardeschi
Andrea Domenici
Francesco Mercaldo
Antonella Santone
Published in:
IJCNN (2020)
Keyphrases
</>
identify potential
log analysis
user behavior
log data
log files
web search engines
query logs
search engine
data analysis
evolutionary algorithm
website
knowledge discovery
user interaction