Research Article

[Retracted] Design of a Network Security Audit System Based on Log Data Mining

Figure 5

Flowchart for matching time reasonableness rules.