access logs
VISUALIZING WEB SERVER LOGS INSIGHTS WITH ELASTIC STACK– A CASE STUDY OF UMMAIL’S ACCESS LOGS
17
Ranker Information Gain Preprocessed Mutal Reinforcement Clustering For Mining Web Access Logs
20
Analyzing Web Access Logs using Spark with Hadoop
5
Analyzing Users Behavior from Web Access Logs using Automated Log Analyzer Tool
5
Data Mining of Web Access Logs Using Classification Techniques
7
Security Analytics and Benchmarking Log Aggregation in the Cloud
7
A Novel Approach for Improving the Recommendation System by Knowledge of Semantic Web in Web Usage Mining
9
Recurring contact opportunities within groups of devices
10
Effect of Cyber Security on Networks Operations (A case study of Vodafone Ghana)
17
Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud
6
Router Attacks-Detection And Defense Mechanisms
5
Security Frameworks Design and Implementation for Dynamic Management of Data and Information in Cognitive Radio Networks
10
detecting outliers in web based network traffic
52
Designing Intrusion Detection System for Web Documents Using Neural Network
8
MATCHING OF PROCESS DATA AND OPERATIONAL DATA FOR A DEEP BUSINESS ANALYSIS: CHECKING THE SUITABILITY OF PROCESS MANAGEMENT TOOLS AND DATABASE MANAGEMENT TOOLS
7
Application of the wood properties of large-diameter Sugi (Cryptomeria japonica) logs to sorting logs and sawing patterns
11
“When, Where, and How” of Efficiency Estimation:Improved Procedures for Stochastic Frontier Modeling
40
An economic feasibility of sawing small sized radiata pine logs
138
Managing lifelong learning records through blockchain
19
EFFICIENT LOG MANAGEMENT OF CLOUD WITH ENCRIPTED QUERY PROCESSING FOR PROTECTION AND CONFIDENTIALITY
10