Search Results - log pattern

Search alternatives:

Refine Results
  1. 1

    Discovering usage patterns from web server logs by Siraj, Fadzilah, Yusoff, Nooraini, Abd. Wahab, Mohd Helmy

    Published 2005
    “…Information collected by the Web servers are kept in the server logs and used as the main source of data for analyzing users’ navigation patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A New Malware Attack Pattern Generalization by Yusof, R., Selamat, S. R., Sahib, S., Abdollah, M. F., Mas'ud, M. Z., Ramly, M.

    Published 2011
    “…The significant threats of malware are still continuing due to their rapid distribution nature on the internet. The malware attack pattern from nine different attack scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    An Improved Traditional Worm Attack Pattern by Yusof, R., Selamat, S. R., Sahib, S., Mas'ud, Z., Abdollah, M. F., Ramly, M.

    Published 2010
    “…The significant threats of traditional worms such as Blaster, Sasser, Code Red and Slammer are still continuing due to their hasty spreading nature on the internet. The worms attack pattern from three different scenarios have been extracted from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Quantifying spatial gap patterns in logged over forest in Gunung Basor using Unmanned Aerial Vehicle (UAV) by Abd Khalid, Nurul Ashikin

    Published 2020
    “…This study aimed to quantify the spatial gap pattern in logged over forest in Gunung Basor using unmanned aerial vehicle (UAV) and to determine the pattern of forest gap such as gap shape, area and distribution. …”
    Get full text
    Undergraduate Final Project Report
  5. 5

    Log Mining Using Generalized Association Rules by Mohd. Helmy, Abd. Wahab

    Published 2004
    “…Information collected by the Web servers are kept in the server log is the main source of data for analyzing user navigation patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Analysis of relationship between logging activities and water quality in Ulu Muda, Kedah / Nurazizah Zakarya by Zakarya, Nurazizah

    Published 2019
    “…The objectives of this study are to identify the pattern of logging activities and water quality in 2011 to 2015 and to map the condition of water quality after logging activities. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Resilience of terrestrial mammals to logging in an active concession in Sarawak, Borneo by Maiwald, Marius Joscha, Mohd-Azlan, Jayasilan, Brodie, Jedediah F.

    Published 2021
    “…We found no significant differences in estimated occupancy or activity patterns of particular species, or in overall species richness, among logging treatments. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Log file analysis using signature detection (LoFA-SD) by Koay, Abigail May Yee

    Published 2011
    “…Therefore this project,LoFA-SD proposes its approach of detecting and analyzing intrusion.The approach is by using signature detection and log files from the network devices to run the process.The system will execute a pattern matching mechanism between the network pattern and the reference intrusion patterns from database.The system will also create statistical reports on the intrusion attacks in the network and among the network devices involved.From the process data retrieval,signature detection, pattern matching until report generation will help the security administrator to identify vulnerable attacks and potential attacks which happen more frequently in a range of time.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    New Multi-step Worm Attack Model by Yusof, R., Selamat, S. R., Sahib, S., Abdollah, M. F., Mas'ud, M. Z., Ramly, M.

    Published 2010
    “…Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. …”
    Get full text
    Get full text
    Article
  10. 10

    Phenology and Availability of Fruit Trees and Their Influence on the Abundance of Selected Animalsi Logged and Primary Forest of Sungai Lalang Forest Reserve, Selangor by Jorge C. Lomoljo, Romeo M. Lomoljo

    Published 2003
    “…The Duncan's test indicated that the leafing pattern in Compartment 24 (VJR) was significantly different (P < 0.05) from Compartment 33 (10-year-old logged forest) and C ompartment 18 (5-year-old logged forest) (P < 0.05). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Shareholding patterns and financial performance: evidence from the banking sector in Bangladesh / Mohammad Kamal Hossain by Hossain, Mohammad Kamal

    Published 2020
    “…This study is distinctive compared to prior studies, as it examines the relationship between the shareholding patterns disclosed in the annual reports of the sampled banks and banks’ performance, as measured by EVA-log along with ROE and TQ, which have not been covered earlier.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    pSPADE: Mining sequential pattern using personalized support threshold value by Alias, Suraya, Md Norwawi, Norita

    Published 2008
    “…As the web log data is considered as complex and temporal, applying Sequential Pattern Mining technique becomes a challenging task.The min sup threshold issue is highlighted - as a pattern is considered as frequent if it meets the specified min sup.If the min sup is high, few patterns are discovered else the mining process will be longer if too many patterns generated using low min sup. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Rough Sets Clustering and Markov model for Web Access Prediction by Chimphlee, Siriporn, Salim, Naomie, Ngadiman, Mohd. Salihin, Chimphlee, Witcha, Srinoy, Surat

    Published 2006
    “…Using this approach, users can effectively mine web log records to discover and predict access patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Advanced Trace Pattern For Computer Intrusion Discovery by Selamat, S. R., Yusof, R., Sahib, S., Mas'ud, Z., Abdollah, M. F., Zainal Abidin, Z.

    Published 2010
    “…Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. …”
    Get full text
    Get full text
    Article
  15. 15

    Scenario Based Worm Trace Pattern Identification Technique by Selamat, S. R., Yusof, R., Sahib, S., Mas'ud, M. Z., Roslan, I., Abdollah, M. F.

    Published 2010
    “…In this research, various logs from different OSI layer are explore to identify the traces leave on the attacker and victim logs, and the attack worm trace pattern are establish in order to reveal true attacker or victim.For the purpose of this paper, it will only concentrate on cybercrime that caused by malware network intrusion and used the traditional worm namely blaster worm variants. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Advanced trace pattern for computer intrusion discovery by Selamat, Siti Rahayu, Yusof, Robiah, Sahib, Shahrin, Mas'ud, Mohd Zaki, Abdollah, Mohd Faizal, Zainal Abidin, Zaheera

    Published 2010
    “…Hence, in this research, diverse logs from different OSI layer are explored to identify the traces left on the attacker and victim logs in order to establish worm trace pattern to defending against the attack and help revealing true attacker or victim. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…The utilization of data that is assembled by Web Usage Mining gives the organizations the capacity to deliver results more compelling to their organizations and expanding of sales. Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    The survival pattern of bacteria during heating and cooling of food prepared in bulk by Arnieyantie, A. H., Noryati, I., Norfezah, M.N., Anderson, N.

    Published 2014
    “…Increased in heating time and temperature resulted in increased numbers of bacteria destruction and E.coli spiked.Higher TPC count( 5.4 Log CFU/g) after internal temperature reached 76°C shows that insufficient heating hence further heating time is needed to ensure safety of the food (less then 5 Log CFU/g) which only can be achieved after the internal temperature reached 92°C.The 6 Log reduction or 6D destruction of E.coli is achieved after internal temperature reached 66.6°C.Increased in TPC count was shown after 2 hours cooling at ambient temperature indicated the germination of bacteria.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20