Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.
No resources for this project.