no code implementations • 9 Nov 2023 • Sihat Afnan, Mushtari Sadia, Shahrear Iqbal, Anindya Iqbal
Lately, there have been studies where transformer-based language models are being used to detect various types of attacks from system logs.