{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:16:23Z","timestamp":1775258183362,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030031916","type":"print"},{"value":"9783030031923","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03192-3_27","type":"book-chapter","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:06:48Z","timestamp":1540508808000},"page":"349-367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Analyzing and Visualizing Web Server Access Log File"],"prefix":"10.1007","author":[{"given":"Minh-Tri","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Thanh-Dang","family":"Diep","sequence":"additional","affiliation":[]},{"given":"Tran","family":"Hoang Vinh","sequence":"additional","affiliation":[]},{"given":"Takuma","family":"Nakajima","sequence":"additional","affiliation":[]},{"given":"Nam","family":"Thoai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"27_CR1","unstructured":"Apache Spark. https:\/\/spark.apache.org. Accessed 10 July 2018"},{"key":"27_CR2","unstructured":"DomainTools. http:\/\/research.domaintools.com\/statistics\/tld-counts. Accessed 10 July 2018"},{"key":"27_CR3","unstructured":"Ho Chi Minh City University of Technology, Vietnam. http:\/\/hcmut.edu.vn. Accessed 10 July 2018"},{"key":"27_CR4","unstructured":"Internet World Stats. https:\/\/www.internetworldstats.com\/stats.htm. Accessed 10 July 2018"},{"key":"27_CR5","unstructured":"Tableau. https:\/\/www.tableau.com. Accessed 10 July 2018"},{"issue":"3","key":"27_CR6","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s10618-011-0228-8","volume":"24","author":"M Agosti","year":"2012","unstructured":"Agosti, M., Crivellari, F., Di Nunzio, G.M.: Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction. Data Min. Knowl. Discov. 24(3), 663\u2013696 (2012)","journal-title":"Data Min. Knowl. Discov."},{"key":"27_CR7","unstructured":"Barsagade, N.: Web usage mining and pattern discovery: a survey paper. Computer Science and Engineering Department, CSE Technical report 8331 (2003)"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"G\u00fcnd\u00fcz, \u015e., \u00d6zsu, M.T.: A web page prediction model based on click-stream tree representation of user behavior. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 535\u2013540. ACM (2003)","DOI":"10.1145\/956750.956815"},{"key":"27_CR9","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2011)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Hussain, T., Asghar, S., Masood, N.: Web usage mining: a survey on preprocessing of web log file. In: 2010 International Conference on Information and Emerging Technologies (ICIET), pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/ICIET.2010.5625730"},{"issue":"3","key":"27_CR11","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1247715.1247720","volume":"25","author":"R Jones","year":"2007","unstructured":"Jones, R., Diaz, F.: Temporal profiles of queries. ACM Trans. Inf. Syst. (TOIS) 25(3), 14 (2007)","journal-title":"ACM Trans. Inf. Syst. (TOIS)"},{"issue":"1","key":"27_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/360402.360406","volume":"2","author":"R Kosala","year":"2000","unstructured":"Kosala, R., Blockeel, H.: Web mining research: a survey. ACM SIGKDD Explor. Newsl. 2(1), 1\u201315 (2000)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"27_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-37882-2","volume-title":"Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data","author":"B Liu","year":"2007","unstructured":"Liu, B.: Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-37882-2"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Murata, T., Saito, K.: Extracting users\u2019 interests from web log data. In: Proceedings of the 2006 IEEE\/WIC\/ACM International Conference on Web Intelligence, pp. 343\u2013346. IEEE Computer Society (2006)","DOI":"10.1109\/WI.2006.75"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Nakajima, T., Yoshimi, M., Wu, C., Yoshinaga, T.: A light-weight content distribution scheme for cooperative caching in telco-CDNs. In: 2016 Fourth International Symposium on Computing and Networking (CANDAR), pp. 126\u2013132. IEEE (2016)","DOI":"10.1109\/CANDAR.2016.0033"},{"issue":"12","key":"27_CR16","doi-asserted-by":"publisher","first-page":"2847","DOI":"10.1587\/transinf.2017PAP0014","volume":"100","author":"T Nakajima","year":"2017","unstructured":"Nakajima, T., Yoshimi, M., Wu, C., Yoshinaga, T.: Color-based cooperative cache and its routing scheme for Telco-CDNs. IEICE Trans. Inf. Syst. 100(12), 2847\u20132856 (2017)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Pabarskaite, Z.: Implementing advanced cleaning and end-user interpretability technologies in web log mining. In: Proceedings of the 24th International Conference on Information Technology Interfaces, ITI 2002, pp. 109\u2013113. IEEE (2002)","DOI":"10.1109\/ITI.2002.1024660"},{"issue":"1","key":"27_CR18","first-page":"15","volume":"1","author":"SK Pani","year":"2011","unstructured":"Pani, S.K., Panigrahy, L., Sankar, V., Ratha, B.K., Mandal, A., Padhi, S.: Web usage mining: a survey on pattern extraction from web logs. Int. J. Instrum. Control Autom. 1(1), 15\u201323 (2011)","journal-title":"Int. J. Instrum. Control Autom."},{"key":"27_CR19","unstructured":"Perkowitz, M., Etzioni, O.: Adaptive web sites: automatically synthesizing web pages. In: AAAI\/IAAI, pp. 727\u2013732 (1998)"},{"key":"27_CR20","first-page":"35","volume":"1","author":"G Piatetsky-Shapiro","year":"1996","unstructured":"Piatetsky-Shapiro, G., Fayyad, U., Smith, P.: From data mining to knowledge discovery: an overview. Adv. Knowl. Discov. Data Min. 1, 35 (1996)","journal-title":"Adv. Knowl. Discov. Data Min."},{"key":"27_CR21","unstructured":"Spiliopoulou, M., Faulstich, L.C.: WUM: a web utilization miner. In: International Workshop on the Web and Databases, Valencia, Spain. Citeseer (1998)"},{"key":"27_CR22","unstructured":"Spiliopoulou, M., Faulstich, L.C., Winkler, K.: A data miner analyzing the navigational behaviour of web users. In: Proceedings of the Workshop on Machine Learning in User Modelling of the ACAI 1999, Greece, July 1999"},{"issue":"4","key":"27_CR23","first-page":"327","volume":"9","author":"K Suneetha","year":"2009","unstructured":"Suneetha, K., Krishnamoorthi, R.: Identifying user behavior by analyzing web server access log file. IJCSNS Int. J. Comput. Sci. Netw. Secur. 9(4), 327\u2013332 (2009)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"27_CR24","first-page":"2008","volume":"48","author":"MHA Wahab","year":"2008","unstructured":"Wahab, M.H.A., Mohd, M.N.H., Hanafi, H.F., Mohsin, M.F.M.: Data pre-processing on web server logs for generalized association rules mining algorithm. World Acad. Sci. Eng. Technol. 48, 2008 (2008)","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Yun, L., Xun, W., Huamao, G.: A hybrid information filtering algorithm based on distributed web log mining. In: Third International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, vol. 1, pp. 1086\u20131091. IEEE (2008)","DOI":"10.1109\/ICCIT.2008.39"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03192-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:53:20Z","timestamp":1775253200000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-03192-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030031916","9783030031923"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03192-3_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"27 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cse.hcmut.edu.vn\/fdse2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}