Author of the publication

A New Approach for Handling Null Values in Web Server Log

, , and . IJACSA - International Journal of Advanced Computer Science and Applications, 1 (July): 1--5 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set., and . Int. J. Digit. Crime Forensics, 13 (6): 1-27 (2021)An Approach to Meta-Alert Generation for Anomalous TCP Traffic., , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 193-216. Springer, (2018)Threats of price scraping on e-commerce websites: attack model and its detection using neural network., and . J. Comput. Virol. Hacking Tech., 17 (1): 75-89 (2021)Self-Attention Mechanism-Based Federated Learning Model for Cross Context Recommendation System., , , , , , , , and . IEEE Trans. Consumer Electron., 70 (1): 2687-2695 (February 2024)Effective Focused Crawling Based on Content and Link Structure Analysis, , and . CoRR, (2009)Multiencoder-based federated intelligent deep learning model for brain tumor segmentation., , , and . Int. J. Imaging Syst. Technol., (January 2024)New biostatistics features for detecting web bot activity on web applications., and . Comput. Secur., (2020)A new web forensic framework for bot crime investigation., and . Digit. Investig., (2020)A New Approach for Handling Null Values in Web Server Log, , and . IJACSA - International Journal of Advanced Computer Science and Applications, 1 (July): 1--5 (2010)Analysis of Vulnerabilities in Hadoop Map Reduce Framework: A Review., , and . WCNC, volume 3244 of CEUR Workshop Proceedings, page 1-12. CEUR-WS.org, (2022)