An approach for frequent access pattern identification in web usage mining
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/CSCITA.2014.6839289
کلیدواژه(گان): Android (operating system),n authorisation,n graphical user interfaces,n invasive software,n mobile computing,n private key cryptography,n smart phones,n Android smart phones,n H-Secure application,n Web server,n application stores,n business applications,n business data,n confidential business information,n confidential data storage,n confidential file storage,n data access,n decryption process,n destination servers,n employee-owned devic
کالکشن
:
-
آمار بازدید
An approach for frequent access pattern identification in web usage mining
Show full item record
contributor author | Sharma, Murli Manohar | |
contributor author | Bala, Anju | |
date accessioned | 2020-03-12T21:58:20Z | |
date available | 2020-03-12T21:58:20Z | |
date issued | 2014 | |
identifier other | 6968481.pdf | |
identifier uri | http://libsearch.um.ac.ir:80/fum/handle/fum/1066940 | |
format | general | |
language | English | |
publisher | IEEE | |
title | An approach for frequent access pattern identification in web usage mining | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8201291 | |
subject keywords | Android (operating system) | |
subject keywords | n authorisation | |
subject keywords | n graphical user interfaces | |
subject keywords | n invasive software | |
subject keywords | n mobile computing | |
subject keywords | n private key cryptography | |
subject keywords | n smart phones | |
subject keywords | n Android smart phones | |
subject keywords | n H-Secure application | |
subject keywords | n Web server | |
subject keywords | n application stores | |
subject keywords | n business applications | |
subject keywords | n business data | |
subject keywords | n confidential business information | |
subject keywords | n confidential data storage | |
subject keywords | n confidential file storage | |
subject keywords | n data access | |
subject keywords | n decryption process | |
subject keywords | n destination servers | |
subject keywords | n employee-owned devic | |
identifier doi | 10.1109/CSCITA.2014.6839289 | |
journal title | dvances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on | |
filesize | 218009 | |
citations | 0 |