|
|
|
Almetwally M. Mostafa, Alaa Altheneyan, Abeer Alnuaim and Aseel Alhadlaq
A computer system generates logs to record all relevant operational data about the system and all operations performed in such systems. System log examination is crucial in the identification of network- and system-level assaults. In comparison to establ...
ver más
|
|
|