共 16 条
[1]
Log Analysis of Cyber Security Training Exercises
[J].
6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015,
2015, 3
:5088-5094
[2]
Insider threat Detection using Log analysis and Event Correlation
[J].
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA),
2015, 45
:436-445
[7]
The changing definition and image of hackers in popular discourse
[J].
INTERNATIONAL JOURNAL OF THE SOCIOLOGY OF LAW,
1996, 24 (02)
:229-251
[9]
The importance of log files in security incident prevention
[J].
Netw. Secur.,
2009, 7 (18-20)
:18-20