Skip to content
#

logs-analysis

Here are 45 public repositories matching this topic...

EzProxy grants access to authenticated users in order for Library patrons to access online resources and subscriptions. However, due to the nature of phishing and identity theft, identifying compromised user accounts can be time-consuming even as data-mining and web-scraping of resources carries great risk to a library's subscriptions. These scr…

  • Updated Jun 11, 2019
  • Jupyter Notebook

Improve this page

Add a description, image, and links to the logs-analysis topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the logs-analysis topic, visit your repo's landing page and select "manage topics."

Learn more