Sciweavers

CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 11 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
CLEF
2009
Springer
13 years 12 months ago
Search Path Visualization and Session Performance Evaluation with Log Files
Our approach to the Log Analysis for Digital Societies (LADS) task of LogCLEF 2009 is to define three different levels of performance: success, failure and strong failure. To inve...
Katrin Lamm, Thomas Mandl, Ralph Koelle
ITCC
2000
IEEE
14 years 3 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh