Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Niemann, Natasha"'
In the past, cybersecurity professionals relied upon Security Event and Information Management systems to ingest network, server, and host logs to assist in detecting suspicious and malicious activity in the network. Detecting threat activities also
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2778::b2d9e5d658cb10220eebd769b8e70635
https://hdl.handle.net/10945/67156
https://hdl.handle.net/10945/67156
Autor:
Garza, Victor R., Wood, Brian P., Monaco, John V., Blockmon, Ray, Males, Nathaniel, Niemann, Natasha, Ross, John
Cyber investigations often involve analysis of large volumes of log files, including network flow data. Machine learning (ML) techniques allow analysts and examiners to more quickly identify traffic flows relevant to the investigation. The research w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2778::721eda8daf8c54876c02be2d8e5898f3
https://hdl.handle.net/10945/65926
https://hdl.handle.net/10945/65926