• No results found

Server Logs

Agglomerative Approach for Identification and Elimination of Web Robots from Web Server Logs to Extract Knowledge about Actual Visitors

Agglomerative Approach for Identification and Elimination of Web Robots from Web Server Logs to Extract Knowledge about Actual Visitors

... web server log analyzers are not very much reliable because the input log files are highly inflated by sessions of automated web traverse software’s, known as web ...web server log repositories imposes a ...

10

VISUALIZING WEB SERVER LOGS INSIGHTS WITH ELASTIC STACK– A CASE STUDY OF UMMAIL’S ACCESS LOGS

VISUALIZING WEB SERVER LOGS INSIGHTS WITH ELASTIC STACK– A CASE STUDY OF UMMAIL’S ACCESS LOGS

... is logs data. Likewise, logs data analytics is practised in many industries for different purposes, including website/system performance improvement, web development, information architecture, web-based ...

17

Augmented Session Similarity Based Framework for Measuring Web User Concern from Web Server Logs

Augmented Session Similarity Based Framework for Measuring Web User Concern from Web Server Logs

... Abstract— In this paper, an augmented sessions similarity based framework is proposed to measure the web user concern from web server logs. This framework utilized the best user session similarity between ...

7

Proactive montoring of server logs to prevent instant shutdown of the server using ElasticSearch

Proactive montoring of server logs to prevent instant shutdown of the server using ElasticSearch

... At present , there are hundreds of millioms of computers, laptops or any electronic devices in not only extravagant but small companies as well generating huge amount of logs. The generation of such huge amounts, ...

6

A Review of Detection and Prevention of Attacks from HTTP Server logs

A Review of Detection and Prevention of Attacks from HTTP Server logs

... A simple example of a DOM-based XSS attack could involve the same setup for the reflected XSS example scenario above. The attacker creates a URL with a malicious script as the “search_term” and solicits it to potential ...

9

Detection and Prevention of Attacks from HTTP Server logs

Detection and Prevention of Attacks from HTTP Server logs

... Linux operating system. That complete virtualization is implemented on the windows operating system, which serves as the host operating system for Linux system. In the proposed system, server’s logs files are used ...

9

WEBSITE LOG ANALYSIS: Case Study of USA Cycling's Website

WEBSITE LOG ANALYSIS: Case Study of USA Cycling's Website

... and server logs: Basic-page based counters that display the number of hits on a page; these provide the least information; Intermediate-third party services that gather and report on site usage; the ...

78

Model Survey on Web Usage Mining and Web Log Mining

Model Survey on Web Usage Mining and Web Log Mining

... Web Server Logs: History of web page requests is maintained as a log ...These logs contain name, IP, date, and time of the request, the request line exactly came from the client, ...different ...

7

1.
													Performance improvement of web server through log files cleaning

1. Performance improvement of web server through log files cleaning

... server’s logs represent actual ...these logs, Web workload was characterized and used to suggest performance enhancements for Web ...Web server logs, and then mining can be performed to ...

6

Generic Log Analyzer Using Hadoop Mapreduce Framework

Generic Log Analyzer Using Hadoop Mapreduce Framework

... According to the available scientific papers it seems that the most evolving and developed area of log file analysis is the www industry. Log files of HTTP servers are now-a- days used not only for system load statistic ...

5

Intelligent Web Server Navigation Usability And Web Usage Data Mining For Improving Users Satisfaction

Intelligent Web Server Navigation Usability And Web Usage Data Mining For Improving Users Satisfaction

... Web has recently become a powerful platform for retrieving useful information. It can also be used for discovering knowledge from web based data.As the World Wide Web WWW[1] becomes predominant today, ensuring and ...

6

Design and Analysis of Multisource Logs Forensic With Lock Technique for Cloud Security Enhancement

Design and Analysis of Multisource Logs Forensic With Lock Technique for Cloud Security Enhancement

... The logs used for investigation are more or less labelled into csp facet and patron facet ...cloud logs are divided into 3 varieties of logs meta-information server, administrative, and not ...

5

User Behavior and Devices Analysis of a Large scale Wireless Local Area Network Based on DHCP

User Behavior and Devices Analysis of a Large scale Wireless Local Area Network Based on DHCP

... Abstract. The Dynamic Host Configuration Protocol (DHCP) is used to effectively allocate IP addresses on a local area network. Despite the widespread usage of DHCP, few studies related to users exist on DHCP ...

5

Foreseeing Client Conduct through Sessions Utilizing the Web Log Mining

Foreseeing Client Conduct through Sessions Utilizing the Web Log Mining

... Intermediary Server Logs: It goes about as an interceding level of getting lies between customer program and web ...the server and customer ...intermediary server [9]. The intermediary ...

8

Analyzing Users Behavior from Web Access Logs using Automated Log Analyzer Tool

Analyzing Users Behavior from Web Access Logs using Automated Log Analyzer Tool

... Web server logs stores click stream data which can be useful for mining purposes ...of server logs: Transfer Log, Agent Log, Error Log and Referrer Log ...

5

Geolocalization Techniques using Log Files in Android

Geolocalization Techniques using Log Files in Android

... different logs depends on the phone model. These logs are not plain text files like in Unix or ...These logs are in fact circular memory ...These logs are handles by Character ...

6

An economic feasibility of sawing small sized radiata pine logs

An economic feasibility of sawing small sized radiata pine logs

... The data on product yields and grades were obtained by sawing 351 sample logs on a standard breast bench. These results were then modified so as to simulate the yields and grades likely to be obtained using an ...

138

MATCHING OF PROCESS DATA AND OPERATIONAL DATA FOR A DEEP BUSINESS ANALYSIS: CHECKING THE SUITABILITY OF PROCESS MANAGEMENT TOOLS AND DATABASE MANAGEMENT TOOLS

MATCHING OF PROCESS DATA AND OPERATIONAL DATA FOR A DEEP BUSINESS ANALYSIS: CHECKING THE SUITABILITY OF PROCESS MANAGEMENT TOOLS AND DATABASE MANAGEMENT TOOLS

... process logs contain the specific information about the specific process and the event logs contain information of the operational ...both logs (process log and event logs) ought to be ...

7

Termite resistance and wood-penetrability of chemically modified tannin and tannin-copper complexes as wood preservatives

Termite resistance and wood-penetrability of chemically modified tannin and tannin-copper complexes as wood preservatives

... Figs.. shape except for the control logs and logs treated with MT, although there were also a few holes made by termites. However, when those logs were cut 5 cm from [r] ...

7

Logs and Exponent notes.doc

Logs and Exponent notes.doc

... Problem 1: The exponential function is shown below. Draw the inverse on the same grid.. For example, the inverse of is the logarithm to the base 10 of x , which is written as.. Probl[r] ...

20

Show all 4176 documents...

Related subjects