slugBe Secure with Analytics

Abstract

Once the data has been captured, monitored and analyzed properly, it can be used to understand security threats which enterprises were not able to detect earlier. Today every organization have security information and event management technology at the place which provides real time analysis of security alerts generated by network hardware and applications.

Authors and Affiliations

Anu Taneja

Keywords

Related Articles

slugEnhanced Genetic Algorithm for solving Travelling Salesman Problem

TSP is optimization problem which is used to find minimum path for salesperson. The Actual use of tsp is routing in network. Minimum path helps to reduce the overall receiving time and...

Development of Comprehensive Parallel I/O Benchmarking Tool for HPC Cluster File Systems

High Performance Computing Clusters uses parallel file systems such as Lustre, GlusterFS for better I/O throughput with multiple clients. These file systems are implemented over high speed interconnects like 10G, Quadri...

Variation in Seed Characteristic among Anatolian Black Pine Populations

The study was carried out on characteristics of seed collected from eight seed stand and two seed orchard populations of Anatolian black pine [Pinus nigra Arn. subsp. pallasiana. (Lamb.) Holmboe.] to estimate variation...

Restoration of Motion Blurred Images using Non Blind Technique-A Review

Image deblurring and restoration has been of great importance nowadays. Image recognition becomes difficult when it comes to blurred and poorly illuminated images and it is here image restoration come to picture. In thi...

A Study of Various Algorithms Used for Analyzing Eavesdropping Attack in Industrial Wireless Sensor Network

In industrial applications, the real time communications among the spatially distributed sensors should satisfy reliability requirements and strict security. Most of the industries use wireless networks for communicatin...

Download PDF file
  • EP ID EP18287
  • DOI -
  • Views 285
  • Downloads 13

How To Cite

Anu Taneja (2014). slugBe Secure with Analytics. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(6), -. https://europub.co.uk/articles/-A-18287