by | Apr 7, 2021 | Computer science, IEEE
Topic: Log mining for security breaches identification.The growth of unstructured messages generated by computer systems and applications in modern computing environment poses a significant challenge in managing and using the information contained in the messages....