Challenges in the analysis of online social networks: A data collection tool perspective
A Goswami, A Kumar - Wireless Personal Communications, 2017 - Springer
The present era of internet has radically changed the way people communicate with each
other. Online Social Network platforms have enhanced this to real-time communication …
other. Online Social Network platforms have enhanced this to real-time communication …
Multi-level anomaly detection: Relevance of big data analytics in networks
The Internet has become a vital source of information; internal and external attacks threaten
the integrity of the LAN connected to the Internet. In this work, several techniques have been …
the integrity of the LAN connected to the Internet. In this work, several techniques have been …
Web data mining trends and techniques
Web Services and Web-based applications are growing at an exponential rate. This is
generating a huge amount of Web data having its own peculiar characteristics. This in turn …
generating a huge amount of Web data having its own peculiar characteristics. This in turn …
[PDF][PDF] A survey on user behaviour analysis in social networks
K Das, SK Sinha - International Journal of Computer Science and …, 2016 - academia.edu
There are some studies on social network user behaviour in literature. Yet it needs more
investigations by research communities to address various challenges in accurate analysis …
investigations by research communities to address various challenges in accurate analysis …
Url classification using non negative matrix factorization
Internet availability on a campus is not metered. Internet link bandwidths are vulnerable as
they can be misused. Moreover, websites blacklist campuses for misuse. Especially …
they can be misused. Moreover, websites blacklist campuses for misuse. Especially …
Unusual internet traffic detection at network edge
Network administrators ensure that all the users within network get fair share of bandwidth,
any bandwidth limit violations is identified and provide some additional controls like denied …
any bandwidth limit violations is identified and provide some additional controls like denied …
[PDF][PDF] High quality design and methodology aspects to enhance large scale web services
Network traffic has increased tremendously due to the rise in the number of Internet users.
This has affected several aspects and characteristics of large scale networks such as …
This has affected several aspects and characteristics of large scale networks such as …
User traffic classification for proxy-server based internet access control
In a LAN, Internet access should be managed well for a better user experience. Those using
a larger share of the bandwidth may be restricted during peak hours to enable others to use …
a larger share of the bandwidth may be restricted during peak hours to enable others to use …
Analysis and classification of web proxy logs based on patterns of traffic rates
N Kiatkumjounwong, S Ngamsuriyaroj… - TENCON 2014-2014 …, 2014 - ieeexplore.ieee.org
Logs are typically used for performing post mortem for abnormal activities. Most Internet
service providers keep the history of users' web accesses in terms of proxy logs for …
service providers keep the history of users' web accesses in terms of proxy logs for …
The Development of the Education Related Multimedia Whitelist Filter using Cache Proxy Log Analysis
B Indrawan, Y Kerlooza - IOP Conference Series: Materials …, 2018 - iopscience.iop.org
The purpose of this study was to show the development of the education related multimedia
whitelist filter using cache proxy log analysis. Regulation of bandwidth utilization should be …
whitelist filter using cache proxy log analysis. Regulation of bandwidth utilization should be …