SB Huang, CF Lai, YL Jeng - Journal of Internet Technology, 2021 - jit.ndhu.edu.tw
With the development and growth of information technology computational thinking has become a crucial skill. Therefore, using programming courses is a common way of training …
TE Wei, HM Lee, AB Jeng, H Lamba, C Faloutsos - Soft Computing, 2019 - Springer
Hackers usually discover and exploit vulnerabilities existing in the entry point before invading a corporate environment. The web server exploration and spams are two popular …
This paper presents an inquiry into combining the research fields of Process Mining and Cyber Forensics. It aims to formulate an answer to the quesfion as to how, and to what …
H Studiawan - 2020 - researchportal.murdoch.edu.au
Attacks on an operating system have become a significant and increasingly common problem. This type of security incident is recorded in forensic artifacts, such as log files …
Web logs are a set of recorded events between clients and web servers. Information provided by these events is valuable to computer system administrators, digital forensic …