Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 suneetha2005identifying
%A Suneetha, K. R.
%A Krishnamoorthy, K. R.
%D 2005
%J International Journal of Computer Science and Network Security
%K
%N 4
%P 327-332
%T Identifying User Behavior by Analyzing Web Server
Access Log File
%V 9
@article{suneetha2005identifying,
added-at = {2013-03-30T18:46:34.000+0100},
author = {Suneetha, K. R. and Krishnamoorthy, K. R.},
biburl = {https://www.bibsonomy.org/bibtex/2409a7c28e5ab6edebfaccb4d2f4c1503/sdo},
interhash = {3df19221981310e32b8325c9226d03cd},
intrahash = {409a7c28e5ab6edebfaccb4d2f4c1503},
journal = {International Journal of Computer Science and Network Security},
keywords = {},
number = 4,
pages = {327-332},
timestamp = {2013-03-30T18:46:34.000+0100},
title = {Identifying User Behavior by Analyzing Web Server
Access Log File},
volume = 9,
year = 2005
}