Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,060,988 papers from all fields of science
Search
Sign In
Create Free Account
Log monitor
Log monitors are a type of software that monitor log files. Servers, application, network and security devices generate log files. Errors, problems…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
System administrator
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Implementation of Web-based Operational Log System at RIBF
A. Uchiyama
,
N. Fukunishi
,
M. Komiyama
2018
Corpus ID: 147702024
The electronic operational log is utilized in many accelerator facilities. It records relevant parameters and automatically…
Expand
2015
2015
Secure Log Data Storage in Cloud by Using AES Algorithm
G.Sindhuja
,
G.Prabhakar
,
G. Prasad
2015
Corpus ID: 196175793
Cloud computing permits very ascendible services to be merely consumed over the online on associate as-needed basis. A serious…
Expand
2014
2014
Encrypted Query Processing Based Log Management in the Cloud for Improved Potential for Confidentiality
N. Prabha
,
T. Rajan
,
Abdul Jaleef
2014
Corpus ID: 55064775
: To address privacy concerns current implementation allows access to log records that are indirectly identified by upload-tag…
Expand
2014
2014
Encrypted Query Processing Based LogManagement of the Cloud for ImprovedProtection of Confidentiality
S. SinuP
,
M.Ananthi
2014
Corpus ID: 62798843
Logging is an important part in central service computing systems. It provides the foundation for accountability and audit…
Expand
Review
2014
Review
2014
Protecting Database from Malicious Transactions by Intrusion Detection Using TAP and RBLM
Surya Pratap Singh
,
U. Tripathi
,
Manish Mishra
2014
Corpus ID: 14196542
The database uses is growing at a very high rate in recent years so the need of securing the database from various types of…
Expand
2013
2013
EFFICIENT LOG MANAGEMENT OF CLOUD WITH ENCRIPTED QUERY PROCESSING FOR PROTECTION AND CONFIDENTIALITY
J. Shriram
2013
Corpus ID: 56374494
To address privacy concerns current implementation allows access to log records that are indirectly identified by upload-tag…
Expand
2009
2009
Protecting SSH at the Transport Layer
A. Heyde
2009
Corpus ID: 16606209
SSH daemons are common targets for brute force attacks. Through log monitoring and firewalling, the impact of these attacks on…
Expand
2009
2009
Data Management Applications for the Service Preparation Subsystem
Ivy Luong
,
G. Chang
,
+10 authors
S. Sadaqathulla
2009
Corpus ID: 60424171
These software applications provide intuitive User Interfaces (UIs) with a consistent look and feel for interaction with, and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE