Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.
No reviews for this project.