主权项 |
1. A computer-implemented method comprising:
receiving, by a processor and from a computing device, an event log, the event log comprising data representing a plurality of events, each event associated with a wall clock time and an uptime clock time; extracting, by the processor and from the event log, a currently analyzed event, the currently analyzed event including a wall clock time and an uptime clock time associated with the currently analyzed event; and responsive to determining, by the processor, that no event in the event log immediately precedes the currently analyzed event, associating a processor time to the currently analyzed event as a trusted event time. |