Now showing items 1-1 of 1

    • El-Haj Mahmoud, Samer Ahmad (Texas A&M University, 2002)
      System log files are valuable assets in detecting security violations and malicious attacks as well as in holding users responsible for their actions. However, the huge size of these logs makes it impractical for system ...