Search Results - log pattern
Search alternatives:
- log pattern »
-
1
Discovering usage patterns from web server logs
Published 2005“…Information collected by the Web servers are kept in the server logs and used as the main source of data for analyzing users’ navigation patterns. …”
Get full text
Get full text
Conference or Workshop Item -
2
A New Malware Attack Pattern Generalization
Published 2011“…The significant threats of malware are still continuing due to their rapid distribution nature on the internet. The malware attack pattern from nine different attack scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. …”
Get full text
Get full text
Conference or Workshop Item -
3
An Improved Traditional Worm Attack Pattern
Published 2010“…The significant threats of traditional worms such as Blaster, Sasser, Code Red and Slammer are still continuing due to their hasty spreading nature on the internet. The worms attack pattern from three different scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. …”
Get full text
Get full text
Get full text
Article -
4
Quantifying spatial gap patterns in logged over forest in Gunung Basor using Unmanned Aerial Vehicle (UAV)
Published 2020“…This study aimed to quantify the spatial gap pattern in logged over forest in Gunung Basor using unmanned aerial vehicle (UAV) and to determine the pattern of forest gap such as gap shape, area and distribution. …”
Get full text
Undergraduate Final Project Report -
5
Log Mining Using Generalized Association Rules
Published 2004“…Information collected by the Web servers are kept in the server log is the main source of data for analyzing user navigation patterns. …”
Get full text
Get full text
Get full text
Thesis -
6
Analysis of relationship between logging activities and water quality in Ulu Muda, Kedah / Nurazizah Zakarya
Published 2019“…The objectives of this study are to identify the pattern of logging activities and water quality in 2011 to 2015 and to map the condition of water quality after logging activities. …”
Get full text
Get full text
Thesis -
7
Resilience of terrestrial mammals to logging in an active concession in Sarawak, Borneo
Published 2021“…We found no significant differences in estimated occupancy or activity patterns of particular species, or in overall species richness, among logging treatments. …”
Get full text
Get full text
Get full text
Article -
8
Log file analysis using signature detection (LoFA-SD)
Published 2011“…Therefore this project,LoFA-SD proposes its approach of detecting and analyzing intrusion.The approach is by using signature detection and log files from the network devices to run the process.The system will execute a pattern matching mechanism between the network pattern and the reference intrusion patterns from database.The system will also create statistical reports on the intrusion attacks in the network and among the network devices involved.From the process data retrieval,signature detection, pattern matching until report generation will help the security administrator to identify vulnerable attacks and potential attacks which happen more frequently in a range of time.…”
Get full text
Get full text
Undergraduates Project Papers -
9
New Multi-step Worm Attack Model
Published 2010“…Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. …”
Get full text
Get full text
Article -
10
Phenology and Availability of Fruit Trees and Their Influence on the Abundance of Selected Animalsi Logged and Primary Forest of Sungai Lalang Forest Reserve, Selangor
Published 2003“…The Duncan's test indicated that the leafing pattern in Compartment 24 (VJR) was significantly different (P < 0.05) from Compartment 33 (10-year-old logged forest) and C ompartment 18 (5-year-old logged forest) (P < 0.05). …”
Get full text
Get full text
Thesis -
11
Shareholding patterns and financial performance: evidence from the banking sector in Bangladesh / Mohammad Kamal Hossain
Published 2020“…This study is distinctive compared to prior studies, as it examines the relationship between the shareholding patterns disclosed in the annual reports of the sampled banks and banks’ performance, as measured by EVA-log along with ROE and TQ, which have not been covered earlier.…”
Get full text
Get full text
Get full text
Article -
12
pSPADE: Mining sequential pattern using personalized support threshold value
Published 2008“…As the web log data is considered as complex and temporal, applying Sequential Pattern Mining technique becomes a challenging task.The min sup threshold issue is highlighted - as a pattern is considered as frequent if it meets the specified min sup.If the min sup is high, few patterns are discovered else the mining process will be longer if too many patterns generated using low min sup. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Rough Sets Clustering and Markov model for Web Access Prediction
Published 2006“…Using this approach, users can effectively mine web log records to discover and predict access patterns. …”
Get full text
Get full text
Conference or Workshop Item -
14
Advanced Trace Pattern For Computer Intrusion Discovery
Published 2010“…Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. …”
Get full text
Get full text
Article -
15
Scenario Based Worm Trace Pattern Identification Technique
Published 2010“…In this research, various logs from different OSI layer are explore to identify the traces leave on the attacker and victim logs, and the attack worm trace pattern are establish in order to reveal true attacker or victim.For the purpose of this paper, it will only concentrate on cybercrime that caused by malware network intrusion and used the traditional worm namely blaster worm variants. …”
Get full text
Get full text
Get full text
Article -
16
Advanced trace pattern for computer intrusion discovery
Published 2010“…Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. …”
Get full text
Get full text
Get full text
Article -
17
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…The utilization of data that is assembled by Web Usage Mining gives the organizations the capacity to deliver results more compelling to their organizations and expanding of sales. Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
The survival pattern of bacteria during heating and cooling of food prepared in bulk
Published 2014“…Increased in heating time and temperature resulted in increased numbers of bacteria destruction and E.coli spiked.Higher TPC count( 5.4 Log CFU/g) after internal temperature reached 76°C shows that insufficient heating hence further heating time is needed to ensure safety of the food (less then 5 Log CFU/g) which only can be achieved after the internal temperature reached 92°C.The 6 Log reduction or 6D destruction of E.coli is achieved after internal temperature reached 66.6°C.Increased in TPC count was shown after 2 hours cooling at ambient temperature indicated the germination of bacteria.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Impacts of tropical selective logging on local-scale movements of understory birds
Published 2021“…Altered movement patterns after logging may reflect increased understory density, changed resource distribution and/or predation risks, and suggest smaller home-range sizes. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
