H Studiawan, C Payne,
F Sohel - … of the 33rd International Conference on …, 2020 - Springer
Computer security events are recorded in several log files. It is necessary to cluster these
logs to discover security threats, detect anomalies, or identify a particular error. A problem …