Browsing Computer Science Masters Papers by Subject "Application logging (Computer science)"
Now showing items 1-1 of 1
-
Threat Identification from Access Logs Using Elastic Stack
(North Dakota State University, 2020)Access log management is an essential part of cybersecurity. Lack of insight into user authentication patterns can hinder readiness and reaction to the growing threat of cyberattacks. Central Authentication Service (CAS) ...