نتایج جستجو برای: five log
تعداد نتایج: 475603 فیلتر نتایج به سال:
Network security is an important area in computer science. Although great efforts have already been made regarding security problems, networks are still threatened by all kinds of potential attacks, which may lead to huge damage and loss. Log files are main sources for security analysis. However, log files are not user friendly. It is laborious work to obtain useful information from log files. ...
abstract this study set out to compare the effect of modality of presentation (subtitled vs. auditory) in the comprehension of verbal content of documentary films among iranian efl students. to this end, (30 male 30 female) students were chosen from two schools. after their homogeneity was established, the students attended the listening sessions to watch five documentary films over t...
We prove that the log Hodge de Rham spectral sequences of certain proper smooth schemes Cartier type in characteristic $$p>0$$ degenerate at $$E_1$$ . also Kodaira vanishings for them hold when they are projective. formulate weak Lefschetz conjecture crystalline cohomologies and it is true cases.
We present a post-mortem log analysis method based on Temporal Logic (TL), Event Processing Language (EPL), and reconstruction approach. After showing that the proposed method could be adapted to any misuse event or attack, we specifically investigate the case of web server misuses. To this end, we examine five different misuses on WordPress web servers, and generate corresponding log files of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید