Conference

Identifying Cybersecurity Threats Using Security Logs: A Review of SIEM Risk Estimates

Adam Solomon Michael Curry Forough Shadbad Byron Marshall

Keywords
BIS
Conference Proceeding Demo or Poster