Font Size: a A A
Keyword [Access logs]
Result: 1 - 8 | Page: 1 of 1
1. Mining Web Access Logs
2. Depth Analysis, Data Mining Web Access Logs
3. User Features Analysis Using Internet Access Logs
4. Fragments File Recovery System Based On Disk Access Log
5. Web Anomaly Intrusion Detection Based On Frequent Closed Episode Rules
6. Reverse engineering of RBAC policy using access logs
7. Discovering and mining user Web-page traversal patterns
8. Exploring user behavior utilizing statistical analysis of WWWhttpd access logs: An enquiry employing Net-Frog
  <<First  <Prev  Next>  Last>>  Jump to