Awuson-David, Kenny; Al-Hadhrami, Tawfik; Alazab, Mamoun; Shah, Nazaraf; Shalaginov, Andrii (Journal article; Peer reviewed, 2021)
Log files are the primary source of recording users, applications and protocols, activities in the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when, why and how a cyber adversary or an ...