7Agosti, Maristella, Crivellari, et al. Web log analysis:a review of a decade of studies about information acquisition, inspection and interpretation of user interaction[J]. Data Mining and Knowledge Discovery, 2010, 24(3): 663-696.
8Suneetha K R, Krishnamoorthi R. Identifying user behavior by analyzing web server access log file[J]. IJCSNS International Journal of Computer Science and Network Security, 2009, 9(4): 327-332.
9Hallam-Baker P M, Behlendorf B. Extended log file format[EB/OL]. 1996.http ://www. w3. org/TR/WD-log-file. html.