John Smiy

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
—Security log analysis is extremely useful for uncovering intrusions and anomalies. However, the sheer volume of log data demands new frameworks and techniques of computing and security. We present a lightweight distributed and parallel security log analysis framework that allows organizations to analyze a massive number of system, network, and transaction(More)
  • 1