• No results found

Log Files

LOCKING DOWN LOG FILES: ENHANCING NETWORK SECURITY BY PROTECTING LOG FILES

LOCKING DOWN LOG FILES: ENHANCING NETWORK SECURITY BY PROTECTING LOG FILES

... importance. Log files are one of the means used by system administrators to detect ...the log files with a file showing normal network traffic ...the log files. Therefore, the ...

5

How To Analyze Log Files In A Web Application On A Hadoop Mapreduce System

How To Analyze Log Files In A Web Application On A Hadoop Mapreduce System

... application log files. Log files are generated at a record rate as people use these web applications available in different areas such as shopping, banking, ...etc. Log file is a record ...

6

Analysis of Web Log Files Integrating Hadoop MapReduce with Naive Bayes Algorithm

Analysis of Web Log Files Integrating Hadoop MapReduce with Naive Bayes Algorithm

... The Web Applications are becoming most popular now a day. Web applications creates big amount of data. So, analysing of these data is very important. To analyse these data here we used the Web Log Analysis using ...

7

Detecting anomalies in system log files using machine learning techniques

Detecting anomalies in system log files using machine learning techniques

... This section gives a short overview over evaluation results that have been used for parameter adjustment. For each approach that is considered in this approach, there are many parameters to be considered. When it comes ...

81

PERFORMANCE OF K-MEANS CLUSTERING AND BIRD FLOCKING ALGORITHM FOR GROUPING THE WEB LOG FILES

PERFORMANCE OF K-MEANS CLUSTERING AND BIRD FLOCKING ALGORITHM FOR GROUPING THE WEB LOG FILES

... Since log files are unformatted text files, they are complex to understand and ...Web log files are preprocessed to eliminate the unwanted information to make the log ...

6

1.
													Performance improvement of web server through log files cleaning

1. Performance improvement of web server through log files cleaning

... Web has recently become a powerful platform for not only retrieving information but also discovering knowledge from web data. The concept of discovering useful pattern on the data has been given a verity of names like ...

6

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

... the log file to the ...through log files that the server has already is referred some of ...server log files are divided into clusters ...

5

Analyzing malware log files for internet access investigation using Hadoop

Analyzing malware log files for internet access investigation using Hadoop

... malware log files become large size and the tools used are not capable of handling high volume of ...large log files, we need appropriate and powerful system for analysing big ...malware ...

30

Assessing Business Learning by Analysing ERP Simulation Log Files

Assessing Business Learning by Analysing ERP Simulation Log Files

... Instead of measuring knowledge and capability directly, game-based assessment enables us to measure the action and performance resulting in learning [Zeying et al., 2007]. In game-based learning, assessments can be ...

19

Fault Identification from Web Log Files by Pattern Discovery

Fault Identification from Web Log Files by Pattern Discovery

... Naïve Bayesian classification algorithm, used for classifying faults into types depends upon their fault category. The fault related data are added to the training dataset with already identified category. To increases ...

5

Analyzing Log Files to Find Hit Count Through the Utilization of Hadoop MapReduce in Cloud Computing Environmen

Analyzing Log Files to Find Hit Count Through the Utilization of Hadoop MapReduce in Cloud Computing Environmen

... processing log file and calculating the total number of hits received by each ...URL. Log file is given as input to the function. A line is added to the log file for each hit in the web ...the ...

5

Automatic reconstruction of the delivered dose of the day using MR-linac treatment log files and online MR imaging.

Automatic reconstruction of the delivered dose of the day using MR-linac treatment log files and online MR imaging.

... The ability of MR-guided treatment machines to continuously survey the patient can also be used to guide real-time adaptive radiotherapy, such as beam gating or multileaf collimator tracking [37,15,38]. Dose ...

7

Analyzing Prediction Accuracy for Small Scale Log Files Using Web Usage Mining Approaches

Analyzing Prediction Accuracy for Small Scale Log Files Using Web Usage Mining Approaches

... server log files, which include Web server access logs and application server ...site files and meta-data, operational databases, application templates, and domain ...

7

An Efficient Analysis of Web Server Log Files for Session Identification using Hadoop Mapreduce

An Efficient Analysis of Web Server Log Files for Session Identification using Hadoop Mapreduce

... in log files which is the main part of ...The log files collected from NASA Kennedy Space centre [11] website holds the entire HTTP request for more than a ...

6

Age and gender user differences of a touch-screen kiosk: a study of kiosk transaction log files

Age and gender user differences of a touch-screen kiosk: a study of kiosk transaction log files

... Log files provide the most detailed record of use, short of an intrusive observation of users. However, little use has been made of log files by previous researchers. The study reported here ...

7

Chronon: A modern alternative to Log Files

Chronon: A modern alternative to Log Files

... ‘splitting/chunking’ a recording at pre-specified time intervals from a central dashboard. For example, you can configure a recording to be split every hour, and thus if you want to examine the events at say 2am and 3am, ...

10

A Framework for Analyzing Software System Log Files.

A Framework for Analyzing Software System Log Files.

... Simple Log File Clustering Tool (SLCT) [41] uses a novel clustering algorithm to mine for patterns in log ...a log file of size 1 GB. He exploits log file properties such as (a) Most words in ...

91

Geolocalization Techniques using Log Files in Android

Geolocalization Techniques using Log Files in Android

... radio log in the below image, it showing a logcat with the radio log in Verbose modem to show the time -v , and –s is to set a filter on the ...the log files from the RIL (Radio Interface ...

6

Managing Relativity SQL log files

Managing Relativity SQL log files

... If you find that, even with proper transaction log backups, your log files are growing too large, contact kCura Client Services. If you know that you will be creating hundreds of gigabytes of new ...

6

Improving Security Through Analysis of Log Files Intersections

Improving Security Through Analysis of Log Files Intersections

... data files it is possible to produce detection ...and log files contain the data that can useful in finding patterns of abnormal use of system’s ...manage log data haven’t kept up with the ...

7

Show all 1348 documents...

Related subjects