Zobrazeno 1 - 10
of 3 132
pro vyhledávání: '"log analysis"'
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 2, Pp 186-202 (2024)
Abstract. The increasing number of information security incidents in higher education underscores the urgent need for robust cybersecurity measures. This paper proposes a comprehensive framework designed to analyze the illegal use of internet resourc
Externí odkaz:
https://doaj.org/article/d48e189293a441bc919483046e8bcdd6
Publikováno v:
Results in Earth Sciences, Vol 2, Iss , Pp 100038- (2024)
This study investigates the GABO field in the onshore Niger Delta Basin using well logs and core samples, with a focus on rock type distribution, reservoir continuity, and petrophysical properties to enhance hydrocarbon exploration accuracy. The rese
Externí odkaz:
https://doaj.org/article/e2f93e7f81af4c5f9b4cde400752b164
Publikováno v:
IEEE Access, Vol 12, Pp 147640-147658 (2024)
A crucial element of Industry 4.0, is the utilization of smart devices that generate log files. Log files are key components containing data on system operations, faults (unexpected glitches or malfunctions), errors (mistakes or incorrect actions), a
Externí odkaz:
https://doaj.org/article/78419aa450f0430283bab4979e12dfaf
Publikováno v:
IEEE Access, Vol 12, Pp 79003-79013 (2024)
The log sequence is often referred to as a language in automated log analysis. The natural consequence of this is that the log sequence should have a structure consisting of words and sentences. However, the word definitions in the log sequence are n
Externí odkaz:
https://doaj.org/article/309f87c696804529992c17c90e92c9a0
Publikováno v:
Applied Sciences, Vol 14, Iss 18, p 8421 (2024)
Localizing faults in a software is a tedious process. The manual approach is becoming impractical because of the large size and complexity of contemporary computer systems as well as their logs, which are often the primary source of information about
Externí odkaz:
https://doaj.org/article/7f950786ffc341c4826994f383b6dab3
Autor:
Eunju Yi, Do-Hyung Park
Publikováno v:
Heliyon, Vol 10, Iss 7, Pp e28474- (2024)
Deciding on a career and securing employment at an ideal company represent significant challenges for students. Employment is not only a personal achievement but also a measure of success for universities and governments. To transform students into c
Externí odkaz:
https://doaj.org/article/06964d88b2b4458d8c8297849b3f4da1
Publikováno v:
IASSIST Quarterly, Vol 48, Iss 1 (2024)
Researchers need to be able to find, access, and use data to participate in open science. To understand how users search for research data, we analyzed textual queries issued at a large social science data archive, the Inter-university Consortium for
Externí odkaz:
https://doaj.org/article/3e59762ebfc4413b985bd3dcc5345ea0
Autor:
Taha Rabea El-Qalamoshy, Mohamed I. Abdel-Fattah, Mohamed Reda, Tharwat H. Abdelhafeez, Salah Shebl Saleh Azzam, Mohamed Mosaad
Publikováno v:
Geomechanics and Geophysics for Geo-Energy and Geo-Resources, Vol 9, Iss 1, Pp 1-43 (2023)
Abstract The southern Meleiha concession, situated within the development encouragement areas of the Agiba Petroleum Company between Matrouh Basin and Shushan basin, spans approximately 700 km2. This study examined late Cretaceous strata to improve t
Externí odkaz:
https://doaj.org/article/9480c0af23674e088c26b572873d697f
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-21 (2023)
Abstract The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society. Detecting compromised email accounts is more challenging than in the social network field, where email accounts have only
Externí odkaz:
https://doaj.org/article/2907ef399537429481f16b72fc3651d5
Publikováno v:
Library Hi Tech, 2021, Vol. 41, Issue 2, pp. 413-431.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/LHT-07-2020-0176