Explore chapters and articles related to this topic
A Deep-dive on Machine Learning for Cyber Security Use Cases
Published in Brij B. Gupta, Michael Sheng, Machine Learning for Computer and Cyber Security, 2019
R. Vinayakumar, K.P. Soman, Prabaharan Poornachandran, Vijay Krishna Menon
As the number of computer applications and the sizes of networks continue to grow, the potential harm which will be caused by attacks launched over the web keeps increasing dramatically. Attackers are constantly developing new security threats which can easily break the present detection and prevention mechanisms. Logs of different computing systems, networks, network packets and transactions contain useful information which can be used for Security Log Analysis. All types of log data can be used to detect the faults and malicious events and it can also be used to monitor the ongoing security threats. The log analysis application provides useful information to the network administrators to defend against existing and new types of security threats. The log analysis application allows the user to visualize the attacks, to establish surprising network activities [3] and to redefine the attack or malicious activity.
Log Analysis
Published in W. Scott Keys, in Environmental Investigations, 2017
These analytical procedures are most easily carried out using computer software designed for log analysis, although some of them can be done using a spreadsheet program. The computer analysis of logs is described in some detail in Section 4.4.
Usability Evaluation of TV Interfaces: Subjective Evaluation Vs. Objective Evaluation
Published in International Journal of Human–Computer Interaction, 2022
Cigdem Altin Gumussoy, Aycan Pekpazar, Mustafa Esengun, Ayse Elvan Bayraktaroglu, Gokhan Ince
Logging or log analysis is the evaluation of audit trail records or logs, which are generated by computer systems, devices, and software in response to some kind of stimuli to make sense of data (Chuvakin et al., 2012). In this study, two logging metrics as keystroke and backspace counts are used. The keystroke count indicates the number of keys of the TV remote control that users click or press while performing tasks. The keystroke count shows how efficiently the user performs the task. The backspace count indicates the number of pressing back keys, which is the key that returns to the previous screen from the user’s screen. The user may try to exit the current screen, thinking that he or she is making a mistake, or try to go back when he or she goes the wrong way.