Author:
Trivedi Devharsh,Triandopoulos Nikos
Publisher
Springer Nature Switzerland
Reference50 articles.
1. Allen, J., et al.: Mnemosyne: an effective and efficient postmortem watering hole attack investigation system. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, pp. 787–802. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3372297.3423355
2. Apache Log4j 2. https://logging.apache.org/log4j/2.x/
3. Bellare, M., Yee, B.: Forward integrity for secure audit logs. Technical report, Citeseer (1997)
4. Lecture Notes in Computer Science;M Bellare,2003
5. Blass, E.O., Noubir, G.: Secure logging with crash tolerance. In: 2017 IEEE Conference on Communications and Network Security (CNS), pp. 1–10 (2017). https://doi.org/10.1109/CNS.2017.8228649