共 50 条
- [41] Methods for Preventing Search Engine-Based Web Server Attacks [J]. TRENDS IN COMPUTER SCIENCE, ENGINEERING AND INFORMATION TECHNOLOGY, 2011, 204 : 11 - 18
- [42] Implementation of an advanced method for auditing web application server logs using access record [J]. Kim, D. (dskim@ssu.ac.kr), 1600, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (05):
- [43] Extracting Usage Patterns from Web Server Log [J]. 2016 2ND INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC), 2016,
- [45] A top-down algorithm for mining web access patterns from web logs [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 838 - 843