Information Technology Reference
In-Depth Information
13. Spiliopoulou, M., Mobasher, B., Berendt, B., Nakagawa, M.: A Framework for the Evalua-
tion of Session Reconstruction Heuristics in Web-Usage Analysis. INFORMS Journal on
Computing 15 , 171-190 (2003)
14. Srivastava, J., Cooley, R., Deshpande, M., Tan, P.N.: Web Usage Mining: Discovery
and Applications of Usage Patterns from Web Data. SIGKDD Explorations Newsletter 1 ,
12-23 (2000)
15. Johnson, B., Shneiderman, B.: Tree-Maps: a Space-Filling Approach to the Visualization
of Hierarchical Information Structures. In: 2nd Conference on Visualization, pp. 284-291.
IEEE Computer Society Press, Los Alamitos (1991)
16. Apache HTTP Server. http://httpd.apache.org/
17. Java DB. http://www.oracle.com/technetwork/java/javadb/index.html
18. PHPIDS. http://www.phpids.org/
19. MySQL. http://www.mysql.com/
20. Subgraph Vega. http://subgraph.com/products.html
21. OWASP Zed Attack Proxy Project. https://www.owasp.org/index.php/OWASP_Zed_
Attack_Proxy_Project
22. Acunetix Web Vulnerability Scanner. http://www.acunetix.com/
23. Plaisant, C.: The Challenge of Information Visualization Evaluation. In: International
Working Conference on Advanced Visual Interfaces, pp. 109-116. ACM, New York
(2004)
Search WWH ::




Custom Search