Back to Results
First PageMeta Content
Information technology management / Computing / Computer security / Data mining / Data security / Information technology / Anomaly detection / Data analysis / Intrusion detection system / Network monitoring / Anomaly / Server


Anomaly detection from server log data. A case study
Add to Reading List

Document Date: 2015-03-18 09:57:49


Open Document

File Size: 2,11 MB

Share Result on Facebook
UPDATE