Now showing items 1-2 of 2
CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities
In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert ...
Semantic Interpretation of Structured Log Files
Data from computer log files record traces of events involving user activity, applications, system software and network traffic. Logs are usually intended for diagnostic and debugging purposes, but their data can be extremely ...