Journal articles on the topic 'Web-logs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Web-logs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Reddy, K. Sudheer, G. Partha Saradhi Varma, and I. Ramesh Babu. "Preprocessing the web server logs." ACM SIGSOFT Software Engineering Notes 37, no. 3 (2012): 1–5. http://dx.doi.org/10.1145/2180921.2180940.
Full textM., B., and Haseena Begum. "An Efficient Web Recommender System for Web Logs." International Journal of Computer Applications 152, no. 3 (2016): 9–12. http://dx.doi.org/10.5120/ijca2016911795.
Full textSong, Bo, and Sheng Bo Chen. "Reorganization of Web Site Structure Using Web Logs." Advanced Materials Research 756-759 (September 2013): 1828–34. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1828.
Full textJoshila Grace, L. K., V. Maheswari, and Dhinaharan Nagamalai. "Analysis of Web Logs And Web User In Web Mining." International Journal of Network Security & Its Applications 3, no. 1 (2011): 99–110. http://dx.doi.org/10.5121/ijnsa.2011.3107.
Full textIngram, Albert L. "Using Web Server Logs in Evaluating Instructional Web Sites." Journal of Educational Technology Systems 28, no. 2 (1999): 137–57. http://dx.doi.org/10.2190/r3ae-ucry-njvr-ly6f.
Full textManchanda, Mahesh. "Web Usage Mining: Dynamic Methodology to Preprocessing Web Logs." HELIX 8, no. 5 (2018): 3810–15. http://dx.doi.org/10.29042/2018-3810-3815.
Full textMasseglia, F., P. Poncelet, M. Teisseire, and A. Marascu. "Web usage mining: extracting unexpected periods from web logs." Data Mining and Knowledge Discovery 16, no. 1 (2007): 39–65. http://dx.doi.org/10.1007/s10618-007-0080-z.
Full textAnandha, Jothi, and P. Gayathri. "A Survey on Clustering Algorithms in Web Usage Mining." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 249–51. https://doi.org/10.31142/ijtsrd12742.
Full textChang, Chih-Kai, Gwo-Dong Chen, and Kou-Liang Ou. "Student Portfolio Analysis by Data Cube Technology for Decision Support of Web-Based Classroom Teacher." Journal of Educational Computing Research 19, no. 3 (1998): 307–28. http://dx.doi.org/10.2190/k6x6-9fmd-yeen-kn42.
Full textB. Raut, Aditi. "Web Logs Analysis for Finding Brand Status." IOSR Journal of Computer Engineering 16, no. 4 (2014): 78–85. http://dx.doi.org/10.9790/0661-16467885.
Full textRichardson, Will. "Web Logs in the English Classroom: More Than Just Chat." English Journal 93, no. 1 (2003): 39–43. http://dx.doi.org/10.58680/ej20032609.
Full textHarika, B., and T. Sudha. "Extraction of Knowledge from Web Server Logs Using Web Usage Mining." Asian Journal of Computer Science and Technology 8, S3 (2019): 12–15. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2113.
Full textPan, Zulie, Yu Chen, Yuanchao Chen, Yi Shen, and Yang Li. "LogInjector: Detecting Web Application Log Injection Vulnerabilities." Applied Sciences 12, no. 15 (2022): 7681. http://dx.doi.org/10.3390/app12157681.
Full textIliou, Christos, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, and Ioannis Kompatsiaris. "Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics." Digital Threats: Research and Practice 2, no. 3 (2021): 1–26. http://dx.doi.org/10.1145/3447815.
Full textWei, Yong Qing, Guang Gang Zhou, Di Xu, and Yu Chen. "Design of the Web Log Analysis System Based on Hadoop." Advanced Materials Research 926-930 (May 2014): 2474–77. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2474.
Full textAsyhari, Moch Yusuf, Juwari Juwari, Abdul Rozaq, and Kelik Sussolaikah. "Pelatihan Web Log Sebagai Media Publikasi Sekolah dan Kegiatan Belajar Mengajar di SDN 1 Ngampel." PaKMas: Jurnal Pengabdian Kepada Masyarakat 2, no. 2 (2022): 340–46. http://dx.doi.org/10.54259/pakmas.v2i2.1267.
Full textQi Wu. "Web Attack Detection Based on Honeypots and Logistic Regression Algorithm." Journal of Electrical Systems 20, no. 3 (2024): 814–22. http://dx.doi.org/10.52783/jes.3013.
Full textLi, Yun, Yongyao Jiang, Juan Gu, et al. "A Cloud-Based Framework for Large-Scale Log Mining through Apache Spark and Elasticsearch." Applied Sciences 9, no. 6 (2019): 1114. http://dx.doi.org/10.3390/app9061114.
Full textJain, Vandita, Tripti Saxena, and Vineet Richhariya. "Analyzing Web Access Logs using Spark with Hadoop." International Journal of Computer Applications 180, no. 1 (2017): 47–51. http://dx.doi.org/10.5120/ijca2017915904.
Full textWu, Chao, Bin Xu, ShanShan Shi, and Bin Zhao. "Time-activity pattern observatory from mobile web logs." International Journal of Embedded Systems 7, no. 1 (2015): 71. http://dx.doi.org/10.1504/ijes.2015.066144.
Full textNicholas, David, and Paul Huntington. "Evaluating the use of newspaper web sites logs." International Journal on Media Management 2, no. 2 (2000): 78–88. http://dx.doi.org/10.1080/14241270009389925.
Full textJiang, Daxin, Jian Pei, and Hang Li. "Mining search and browse logs for web search." ACM Transactions on Intelligent Systems and Technology 4, no. 4 (2013): 1–37. http://dx.doi.org/10.1145/2508037.2508038.
Full textAlsaleh, Mansour, Abdulrahman Alarifi, Abdullah Alqahtani, and AbdulMalik Al-Salman. "Visualizing web server attacks: patterns in PHPIDS logs ‡." Security and Communication Networks 8, no. 11 (2014): 1991–2003. http://dx.doi.org/10.1002/sec.1147.
Full textMuhammad, Harni Yusnidar, and Jasni Mohamad Zain. "VISUALIZING WEB SERVER LOGS INSIGHTS WITH ELASTIC STACK– A CASE STUDY OF UMMAIL’S ACCESS LOGS." MALAYSIAN JOURNAL OF COMPUTING 3, no. 1 (2018): 37. http://dx.doi.org/10.24191/mjoc.v3i1.4882.
Full textKumar, Rakesh, Kanwal Garg, and Vinod Kumar. "Extraction of Frequent Patterns from Web Logs using Web Log Mining Techniques." International Journal of Computer Applications 59, no. 10 (2012): 19–25. http://dx.doi.org/10.5120/9584-4063.
Full textRamanathaiah, Ramakrishnan M., Bhawna Nigam, and M. Niranjanamurthy. "Construction of User’s Navigation Sessions from Web Logs for Web Usage Mining." Journal of Computational and Theoretical Nanoscience 17, no. 9 (2020): 4432–37. http://dx.doi.org/10.1166/jctn.2020.9091.
Full textJose, Jeeva, and Lal P. Sojan. "Analysis of the Temporal Behaviour of Search Engine Crawlers at Web Sites." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 06 (2013): 136–42. https://doi.org/10.5281/zenodo.14602851.
Full textHU, JIA, and NING ZHONG. "WEB FARMING WITH CLICKSTREAM." International Journal of Information Technology & Decision Making 07, no. 02 (2008): 291–308. http://dx.doi.org/10.1142/s0219622008002971.
Full textDeng, An Yuan. "Research of Log System for IP Network Storage." Advanced Materials Research 181-182 (January 2011): 19–24. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.19.
Full textAsyhari, Ardian, and Rahma Diani. "Pembelajaran fisika berbasis web enhanced course: mengembangkan web-logs pembelajaran fisika dasar I." Jurnal Inovasi Teknologi Pendidikan 4, no. 1 (2017): 13. http://dx.doi.org/10.21831/jitp.v4i1.13435.
Full textHusin, Husna Sarirah. "Predicting User Navigation in an Online Newspaper Site Using Association Rules Mining and Markov Model." International Journal of Engineering & Technology 7, no. 4.29 (2018): 40–44. http://dx.doi.org/10.14419/ijet.v7i4.29.21840.
Full textYAMAGUCHI, Yumi, Yuko IKEHATA, Takayuki ITOH, and Yasumasa KAJINAGA. "Visualization of Web access logs using Data Jewelry Box." Journal of the Visualization Society of Japan 22, no. 1Supplement (2002): 111–14. http://dx.doi.org/10.3154/jvs.22.1supplement_111.
Full textR, Vivek, Prasad Mirje, and Sushmitha N. "Recommendation for Web Service Composition by Mining Usage Logs." International Journal of Data Mining & Knowledge Management Process 6, no. 2 (2016): 83–89. http://dx.doi.org/10.5121/ijdkp.2016.6207.
Full textLI, Xiang, Jin-Peng HUAI, Xu-Dong LIU, Hai-Long SUN, and Xian-Yang QU. "Web Service Business Protocol Mining Based on Message Logs." Journal of Software 22, no. 7 (2011): 1413–25. http://dx.doi.org/10.3724/sp.j.1001.2011.03820.
Full textAbdullah, Norhaiza Ya, Husna Sarirah Husin, Herny Ramadhani, and Shanmuga Vivekanada Nadarajan. "Pre-Processing of Query Logs in Web Usage Mining." Industrial Engineering and Management Systems 11, no. 1 (2012): 82–86. http://dx.doi.org/10.7232/iems.2012.11.1.082.
Full textKeyes, Oliver, Bob Rudis, and Jay Jacobs. "R Packages to Aid in Handling Web Access Logs." R Journal 8, no. 1 (2016): 360. http://dx.doi.org/10.32614/rj-2016-026.
Full textKelly, Tara. "A Resource Guide for Web-Based Physical Activity Logs." Bariatric Surgical Practice and Patient Care 8, no. 2 (2013): 83–84. http://dx.doi.org/10.1089/bari.2013.9986.
Full textTaksa, Isak, Sarah Zelikovitz, and Amanda Spink. "Using web search logs to identify query classification terms." International Journal of Web Information Systems 3, no. 4 (2007): 315–27. http://dx.doi.org/10.1108/17440080710848107.
Full textBernstein, Mark. "Two open problems in hypertext reading and Web logs." ACM SIGWEB Newsletter 8, no. 1 (1999): 24–26. http://dx.doi.org/10.1145/951413.951419.
Full textLi, Bo, Ying Lin, and Simin Zhang. "Multi-Task Learning for Intrusion Detection on web logs." Journal of Systems Architecture 81 (November 2017): 92–100. http://dx.doi.org/10.1016/j.sysarc.2017.10.011.
Full textDiligenti, Michelangelo, Marco Gori, and Marco Maggini. "A unified representation of web logs for mining applications." Information Retrieval 14, no. 3 (2010): 215–36. http://dx.doi.org/10.1007/s10791-010-9160-6.
Full textAlexanian, J. A. "Publicly Intimate Online: Iranian Web Logs in Southern California." Comparative Studies of South Asia, Africa and the Middle East 26, no. 1 (2006): 134–45. http://dx.doi.org/10.1215/1089201x-2005-015.
Full textGARCÍA ADEVA, JUAN JOSÉ, and JUAN MANUEL PIKATZA ATXA. "WEB MISUSE DETECTION THROUGH TEXT CATEGORISATION OF APPLICATION SERVER LOGS." International Journal on Artificial Intelligence Tools 15, no. 05 (2006): 849–54. http://dx.doi.org/10.1142/s0218213006002989.
Full textMurray, James. "AN ASSESSMENT OF FUZZY TEMPORAL EVENT CORRELATION TOWARDS CYBER CRIME INVESTIGATION." INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES 9, no. 2 (2021): 10–14. http://dx.doi.org/10.55083/irjeas.2021.v09i02006.
Full textJin, Jingquan, and Xin Lin. "Web Log Analysis and Security Assessment Method Based on Data Mining." Computational Intelligence and Neuroscience 2022 (August 25, 2022): 1–9. http://dx.doi.org/10.1155/2022/8485014.
Full textRekha, Sundari.M, and Reddy.PVGD Prasad. "PREPROCESSING OF WEB LOG DATA FOR WEB PERSONALIZATION." International Journal of Advances in Engineering & Technology 10, no. 1 (2017): 93–104. https://doi.org/10.5281/zenodo.3958601.
Full textChen, Gwo-Dong, Kuo-Liang Ou, and Chin-Yeh Wang. "Use of Group Discussion and Learning Portfolio to Build Knowledge for Managing Web Group Learning." Journal of Educational Computing Research 28, no. 3 (2003): 291–315. http://dx.doi.org/10.2190/3vxr-a5qt-xltp-twpk.
Full textGoddard, Lisa. "Getting to the Source: a Survey of Quantitative Data Sources Available to the Everyday Librarian: Part I: Web Server Log Analysis." Evidence Based Library and Information Practice 2, no. 1 (2007): 48. http://dx.doi.org/10.18438/b8b590.
Full textGoddard, Lisa. "Getting to the Source: a Survey of Quantitative Data Sources Available to the Everyday Librarian: Part II: Data Sources from Specific Library Applications." Evidence Based Library and Information Practice 2, no. 1 (2007): 68. http://dx.doi.org/10.18438/b86c72.
Full textAkremi, Aymen, Mohamed-Foued Sriti, Hassen Sallay, and Mohsen Rouached. "Ontology-Based Smart Sound Digital Forensics Analysis for Web Services." International Journal of Web Services Research 16, no. 1 (2019): 70–92. http://dx.doi.org/10.4018/ijwsr.2019010104.
Full text