ÁĹĎÁĽúÁĒ®śą∑ŤßíŤČ≤Ťĺ®ŤĮÜŚŹäŚÖ∂śĀ∂śĄŹŤģŅťóģŤ°ĆšłļÁöĄŚŹĎÁéįśĖĻś≥ē (Identification of User's Role and Discovery Method of Its Malicious Access Behavior in Web Logs).
ÁĹĎÁĽúÁĒ®śą∑ŤßíŤČ≤Ťĺ®ŤĮÜŚŹäŚÖ∂śĀ∂śĄŹŤģŅťóģŤ°ĆšłļÁöĄŚŹĎÁéįśĖĻś≥ē (Identification of User's Role and Discovery Method of Its Malicious Access Behavior in Web Logs).
(xsd:string)
ÁĹĎÁĽúÁĒ®śą∑ŤßíŤČ≤Ťĺ®ŤĮÜŚŹäŚÖ∂śĀ∂śĄŹŤģŅťóģŤ°ĆšłļÁöĄŚŹĎÁéįśĖĻś≥ē (Identification of User's Role and Discovery Method of Its Malicious Access Behavior in Web Logs).
(xsd:string)