Log analysis aided by latent semantic mapping
In an age of zero-day exploits and increased on-line attacks on computing infrastructure, operational security practitioners are becoming increasingly aware of the value of the information captured in log events. Analysis of these events is critical during incident response, forensic investigations...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Rhodes University
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10962/d1002963 |