[1]
G. Zhou, X. Gong, and D. Zhong, “Tracking and Analyzing Web Penetration Attacks through Splunk-Driven Log Analysis”, ICJE, vol. 10, no. 8, pp. 1–9, Jul. 2024, doi: 10.6919/ICJE.202408_10(8).0001.