Hits:
Title of Paper:AClog: attack chain construction based on log correlation
Indexed by:Journal paper
Translation or Not:No
Included Journals:SCI
Date:2021-05-19
Prev One:Privacy-preserving verification and root-cause tracing towards UAV social networks
Next One:Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning