• No results found

access logs

VISUALIZING WEB SERVER LOGS INSIGHTS WITH ELASTIC STACK– A CASE STUDY OF UMMAIL’S ACCESS LOGS

VISUALIZING WEB SERVER LOGS INSIGHTS WITH ELASTIC STACK– A CASE STUDY OF UMMAIL’S ACCESS LOGS

... is logs data. Likewise, logs data analytics is practised in many industries for different purposes, including website/system performance improvement, web development, information architecture, web-based ...

17

Ranker Information Gain Preprocessed Mutal Reinforcement Clustering For Mining Web Access Logs

Ranker Information Gain Preprocessed Mutal Reinforcement Clustering For Mining Web Access Logs

... Web usage mining investigates the navigation patterns in web access logs and obtains the most relevant user information. This helps to introduce different strategies for several web-related applications, to ...

20

Analyzing Web Access Logs using Spark with Hadoop

Analyzing Web Access Logs using Spark with Hadoop

... According to [1], net mining[13] is that the application knowledge mining techniques to extract helpful knowledge from net data that features net document, link between documents, usage logs of internet sites etc. ...

5

Analyzing Users Behavior from Web Access Logs using Automated Log Analyzer Tool

Analyzing Users Behavior from Web Access Logs using Automated Log Analyzer Tool

... Web Access Logs that are generated on the server while the user is accessing the ...Web access log comprises of various entries like the name of the user, his IP address, number of bytes transferred ...

5

Data Mining of Web Access Logs Using Classification Techniques

Data Mining of Web Access Logs Using Classification Techniques

... The web content is the authentic data the web page was deliberate to convey to the users. It consists of several types of data such as unstructured text, graphics, sound, video and semi- structured hypertext. Content ...

7

Security Analytics and Benchmarking Log Aggregation in the Cloud

Security Analytics and Benchmarking Log Aggregation in the Cloud

... require logs to be stored and analysed to check if compliance is being ...provides logs for its different services like EC2 (Elastic Compute Cloud), S3 (Simple Storage Service), VPCs (Virtual Private ...

7

A Novel Approach for Improving the Recommendation System by Knowledge of Semantic Web in Web Usage Mining

A Novel Approach for Improving the Recommendation System by Knowledge of Semantic Web in Web Usage Mining

... Abstract:- The World Wide, We has influenced a lot to both users as well as the web site owners. Massive growth of World Wide Web increases the complexity for users to browse effectively. For increasing web site uses and ...

9

Recurring contact opportunities within groups of devices

Recurring contact opportunities within groups of devices

... The work described in [4] studies ICTs in two distinct datasets. One is based on records produced by an external observer. In particular, data collected from the access logs of WiFi net- works. The second, ...

10

Effect of Cyber Security on Networks Operations (A case study of Vodafone Ghana)

Effect of Cyber Security on Networks Operations (A case study of Vodafone Ghana)

... maintaining access logs, and checking for unauthorized access to important ...undesired access to its servers from the outside world was not fully ...

17

Improved  Data  Confidentiality  of  Audit  Trail  Data  in  Multi-Tenant  Cloud

Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud

... initial access point and provides additional capabilities like load balancing, caching, security monitoring capturing events, syslogs related to hosts residing in the ...audit-trail logs captured by reverse ...

6

Router Attacks-Detection And Defense Mechanisms

Router Attacks-Detection And Defense Mechanisms

... Once an attack or a misconfiguration is detected, some defense mechanism should be taken to curb it. Access lists are an excellent tool for router security. So according to the anomalous behavior of the router, ...

5

Security Frameworks Design and Implementation for Dynamic Management of Data and Information in Cognitive Radio Networks

Security Frameworks Design and Implementation for Dynamic Management of Data and Information in Cognitive Radio Networks

... The access point which is the SPDP as usual intercepts the request and demand for the user profile and security information to determine the rights and privileges assigned to the user, and check if there are ...

10

detecting outliers in web based network traffic

detecting outliers in web based network traffic

... Because HTTP is a stateless protocol, the application has to keep track of its sessions using cookies if it want to preserve the state across multiple requests, meaning that the majority of the requests are part of a ...

52

Designing Intrusion Detection System for Web Documents Using Neural Network

Designing Intrusion Detection System for Web Documents Using Neural Network

... Abstract: Cryptographic systems are the most widely used techniques for information security. These systems however have their own pitfalls as they rely on prevention as their sole means of defense. That is why most of ...

8

MATCHING OF PROCESS DATA AND OPERATIONAL DATA FOR A DEEP BUSINESS ANALYSIS: CHECKING THE SUITABILITY OF PROCESS MANAGEMENT TOOLS AND DATABASE MANAGEMENT TOOLS

MATCHING OF PROCESS DATA AND OPERATIONAL DATA FOR A DEEP BUSINESS ANALYSIS: CHECKING THE SUITABILITY OF PROCESS MANAGEMENT TOOLS AND DATABASE MANAGEMENT TOOLS

... ABSTRACT:- Companies have long been taking assistance of simple business analysis to make their strategic decisions but the dilemma of using this method to make internal and external decisions is that the decision makers ...

7

Application of the wood properties of large-diameter Sugi (Cryptomeria japonica) logs to sorting logs and sawing patterns

Application of the wood properties of large-diameter Sugi (Cryptomeria japonica) logs to sorting logs and sawing patterns

... Sugi logs grown in Ibaraki Prefecture were used in this study, 32–42 cm in diameter and ...these logs were sold for lumber production in the log market, their quality reflects the general quality of ...

11

“When, Where, and How” of Efficiency Estimation:Improved Procedures for Stochastic Frontier Modeling

“When, Where, and How” of Efficiency Estimation:Improved Procedures for Stochastic Frontier Modeling

... The probabilities and logs of the scale parameters of the normal and half-normal distributions for the two error components of the model are functions of logs of input prices, outputs, e[r] ...

40

An economic feasibility of sawing small sized radiata pine logs

An economic feasibility of sawing small sized radiata pine logs

... small logs is a sawmilling problem all over the world. Large logs are usually considered the best raw material for the production of sawn timber; the rate of production generally increasing as log diameter ...

138

Managing lifelong learning records through blockchain

Managing lifelong learning records through blockchain

... managing access rights through the use of smart contracts on the ...learning logs (BOLL) is a platform that enable learners to move their learning records from one institution to another in a secure and ...

19

EFFICIENT LOG MANAGEMENT OF CLOUD WITH ENCRIPTED QUERY PROCESSING FOR PROTECTION AND CONFIDENTIALITY

EFFICIENT LOG MANAGEMENT OF CLOUD WITH ENCRIPTED QUERY PROCESSING FOR PROTECTION AND CONFIDENTIALITY

... allows access to log records that are indirectly identified by upload-tag ...encrypted logs without breaching confidentiality or ...with access to that ...

10

Show all 10000 documents...

Related subjects