共 50 条
- [31] Fast attack detection system using log analysis and attack tree generation CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1827 - 1835
- [33] Analyzing Log Files for Postmortem Intrusion Detection IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (06): : 1690 - 1704
- [34] Analysis of Log Files as a Security Aid SISTEMAS E TECNOLOGIAS DE INFORMACAO, VOL I, 2011, : 116 - +
- [36] The Research of Preprocessing and Pattern Discovery Techniques on Web Log files 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 139 - 145
- [37] Reconstruction of User Sessions from Web Server Log PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 37 - 42
- [38] Analyzing and Visualizing Web Server Access Log File FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018, 2018, 11251 : 349 - 367
- [39] Extracting Usage Patterns from Web Server Log 2016 2ND INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC), 2016,