Log analysis

Results: 576



#Item
1LTE / Technology / Mobile technology / Wireless / Software-defined radio / Mobile telecommunications / ENodeB / System Architecture Evolution / Telecommunications / E-UTRA / User equipment / Mobility management

Protocol log analysis with constraint programming Mats Carlsson Olga Grinchtein Justin Pearson

Add to Reading List

Source URL: smt2014.it.uu.se

Language: English - Date: 2014-07-18 15:02:20
2

Massive Distributed and Parallel Log Analysis For Organizational Security Xiaokui Shu, John Smiy, Danfeng (Daphne) Yao, and Heshan Lin Department of Computer Science Virginia Tech Blacksburg, VirginiaEmails: {subx

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2013-11-20 11:50:22
    3

    SECURITY MONITORING & ALERTING SERVICES LOG MONITORING, ANALYSIS, THREAT INTELLIGENCE, & ALERT MANAGEMENT Enterprises can generate millions of log alerts every day, making the recognition and analysis of meaningful alert

    Add to Reading List

    Source URL: foresite.com

    Language: English - Date: 2018-02-22 13:10:47
      4

      Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks Ting-Fang Yen Alina Oprea

      Add to Reading List

      Source URL: www.covert.io

      - Date: 2017-08-29 09:25:43
        5

        Level 3 – Advanced Listening Log Advanced audiobook listeners will benefit from Level 3 activities, which guide students to deepen their listening comprehension and critical analysis. As in Level 2, these activities ar

        Add to Reading List

        Source URL: www.audiopub.org

        - Date: 2016-02-04 13:11:03
          6

          Beyond Web Application Log Analysis using ApacheTM Hadoop ® A Whitepaper by Orzota, Inc.

          Add to Reading List

          Source URL: www.orzota.com

          - Date: 2014-04-01 15:13:02
            7

            VIT-PLA: Visual Interactive Tool for Process Log Analysis Sen Yang1, Xin Dong1, Moliang Zhou1, Xinyu Li1, Shuhong Chen1, Rachel Webman3, Aleksandra Sarcevic2, Ivan Marsic1 and Randall S. Burd3 1 Rutgers University Piscat

            Add to Reading List

            Source URL: poloclub.gatech.edu

            - Date: 2016-07-22 15:05:22
              8

              WWWRefereed Track: Data Mining - Log Analysis April 21-25, 2008 · Beijing, China Using the Wisdom of the Crowds for Keyword Generation Ariel Fuxman

              Add to Reading List

              Source URL: www.cs.uoi.gr

              - Date: 2011-11-03 13:56:53
                9

                IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. X, NO. Y, MONTHLatent Log-Linear Models for Handwritten Digit Classification

                Add to Reading List

                Source URL: thomas.deselaers.de

                - Date: 2014-10-11 09:29:33
                  10Education / Academia / Knowledge / Educational psychology / Higher education / Distance education / Educational technology / Information technology / Data analysis / Student exchange program

                  The global benchmark for the international student experience The ISBTM Log in to interact and explore your data

                  Add to Reading List

                  Source URL: www.gate-germany.de

                  Language: English - Date: 2016-07-11 08:53:51
                  UPDATE