Now showing items 1-1 of 1

    • Threat Identification from Access Logs Using Elastic Stack 

      Vethanayagam, Suhanthan (North Dakota State University, 2020)
      Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...