Log file analysis using signature detection (LoFA-SD)
The increasing popularity of network technology has brought convenience to human life.People have started to rely on network technologies more and more in their daily life. It has slowly becoming a very important part in the human life. Network technologies have involved in communication, medical,fi...
| Main Author: | Koay, Abigail May Yee |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/4746/ http://umpir.ump.edu.my/id/eprint/4746/1/ABIGAIL_KOAY_MAY_YEE.PDF |
Similar Items
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
LQ-Moments: application to the log-normal distribution
by: Shabri, Ani, et al.
Published: (2006)
by: Shabri, Ani, et al.
Published: (2006)
File transfer using mobile agent / Radin Izzatul Muna Ahmad Zabidi
by: Ahmad Zabidi, Radin Izzatul Muna
Published: (2004)
by: Ahmad Zabidi, Radin Izzatul Muna
Published: (2004)
An implementation of LoSS detection using SOSS model
by: Rohani, M.F, et al.
Published: (2007)
by: Rohani, M.F, et al.
Published: (2007)
An object-oriented data automation system for Microsoft Excel files / Ng Lee Yean.
by: Ng, Lee Yean
Published: (2003)
by: Ng, Lee Yean
Published: (2003)
Higher dimensional log-linear model and its application
by: Usman , Mustofa, et al.
Published: (2015)
by: Usman , Mustofa, et al.
Published: (2015)
Post quantum signature schemes for the block chain technology
by: Wu, Zi Feng
Published: (2019)
by: Wu, Zi Feng
Published: (2019)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
Adaptive minimum error least significant bit replacement method for steganography using JPG/JPEG and PNG files
by: Wamiliana, Wamiliana, et al.
Published: (2015)
by: Wamiliana, Wamiliana, et al.
Published: (2015)
Some Extensions Of Log Aesthetic Curves And Its Acceleration Using General Processing Unit (GPU)
by: Teh, Yee Meng
Published: (2022)
by: Teh, Yee Meng
Published: (2022)
SC and IAP Meeting for MQA/FA12425 Program Compliance Assessment Feedbacks
by: Siti Zanariah, Satari
Published: (2023)
by: Siti Zanariah, Satari
Published: (2023)
Lebih kromosom punca SD
by: Berita Harian ,
Published: (2011)
by: Berita Harian ,
Published: (2011)
Bootstrap confidence intervals for the mode of log-logistic hazard function
by: Hasan, Siti Normah
Published: (2009)
by: Hasan, Siti Normah
Published: (2009)
A multi-resolution approach to on-line signature intra-class variability modelling
by: Liew, Lee Hung
Published: (2005)
by: Liew, Lee Hung
Published: (2005)
On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2013)
Securing anonymous authenticated announcement protocol for group signature in internet of vehicle / Nur Afiqah Suzelan Amir
by: Nur Afiqah , Suzelan Amir
Published: (2021)
by: Nur Afiqah , Suzelan Amir
Published: (2021)
A Model Driven Analysis of the 802.11 CSMA/CA Protocol through SD2PN
by: M. A., Ameedeen, et al.
Published: (2014)
by: M. A., Ameedeen, et al.
Published: (2014)
Structures (struct) and files
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
SD1000 Collaboration: Hunting down the Subdwarf Populations
by: Nemeth, P., et al.
Published: (2014)
by: Nemeth, P., et al.
Published: (2014)
How SD-OCT is changing our view of DME
by: Salam, Adzura, et al.
Published: (2010)
by: Salam, Adzura, et al.
Published: (2010)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
IoT and LoRaWAN
by: Ashraf, Ahmed, et al.
Published: (2020)
by: Ashraf, Ahmed, et al.
Published: (2020)
A Modified Spectral Gradient Method for Solving Non Linear System
by: Koay, Yeong Lin
Published: (2020)
by: Koay, Yeong Lin
Published: (2020)
Code clone detection model: a SWOT analysis perspective
by: Mubarak-Ali, Al-Fahim, et al.
Published: (2018)
by: Mubarak-Ali, Al-Fahim, et al.
Published: (2018)
Discriminant functions and multi-resolution analysis (MRA) for disease detection
by: Rijal, Omar Mohd, et al.
Published: (2006)
by: Rijal, Omar Mohd, et al.
Published: (2006)
Modelling doubly interval censored survival data via the log logistic distribution with covariate
by: Loh, Yue Fang
Published: (2017)
by: Loh, Yue Fang
Published: (2017)
Read data from a file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Digital filing and file control system (DFFCS)
by: Teh, Suet Khim
Published: (2005)
by: Teh, Suet Khim
Published: (2005)
An adaptive wrapper algorithm for file transfer applications to support optimal large file transfers
by: Ghobadi, Alireza, et al.
Published: (2009)
by: Ghobadi, Alireza, et al.
Published: (2009)
The future Malaysian dental workforce: System Dynamic (SD) modelling
by: Che Musa, Muhd Firdaus, et al.
Published: (2017)
by: Che Musa, Muhd Firdaus, et al.
Published: (2017)
Object tracking in SD-OCT images using Kalman filters
by: Guven, Deniz
Published: (2015)
by: Guven, Deniz
Published: (2015)
Technique Of Pvt Analysis On Sd Controller Timing Validation For 28nm Soc Fpga
by: Yusni, Nur Amalina Aiza
Published: (2015)
by: Yusni, Nur Amalina Aiza
Published: (2015)
A comparison of methods to detect publication bias for meta-analysis of continuous data
by: Nik Idris, Nik Ruzni
Published: (2012)
by: Nik Idris, Nik Ruzni
Published: (2012)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
N/A and signature analysis for malwares detection and removal
by: Jawad, Ahmad Ridha, et al.
Published: (2019)
by: Jawad, Ahmad Ridha, et al.
Published: (2019)
A 3G/WiFi-enabled 6LoWPAN-based u-healthcare system for ubiquitous real-time monitoring and data logging
by: Tabish, Rohan, et al.
Published: (2014)
by: Tabish, Rohan, et al.
Published: (2014)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Testing file
by: Ilina, Musa
Published: (2014)
by: Ilina, Musa
Published: (2014)
Similar Items
-
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019) -
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015) -
LQ-Moments: application to the log-normal distribution
by: Shabri, Ani, et al.
Published: (2006) -
File transfer using mobile agent / Radin Izzatul Muna Ahmad Zabidi
by: Ahmad Zabidi, Radin Izzatul Muna
Published: (2004) -
An implementation of LoSS detection using SOSS model
by: Rohani, M.F, et al.
Published: (2007)