Zobrazeno 1 - 1
of 1
pro vyhledávání: '"Niemann, Natasha K."'
In the past, cybersecurity professionals relied upon Security Event and Information Management systems to ingest network, server, and host logs to assist in detecting suspicious and malicious activity in the network. Detecting threat activities also
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2778::b2d9e5d658cb10220eebd769b8e70635
https://hdl.handle.net/10945/67156
https://hdl.handle.net/10945/67156