slugBe Secure with Analytics

Abstract

Once the data has been captured, monitored and analyzed properly, it can be used to understand security threats which enterprises were not able to detect earlier. Today every organization have security information and event management technology at the place which provides real time analysis of security alerts generated by network hardware and applications.

Authors and Affiliations

Anu Taneja

Keywords

Related Articles

Effect of Solvents on Mixture of Azur B and Sudan Black B Photosensitizer in Fabrication of DSSC

The photoelectrodes of thin film of dye sensitized solar cells (DSSC) are generally fabricated from TiO2 nanoparticles paste, above which dye is adsorbed. The aim of this paper is to study the influence of mixing differ...

Crack Detection Via Spatially Tuned Multiple Feature Classifier

Cracks are an important indicator of the safety status of the civil structures. Detection of cracks on civil structures is a vital task for maintaining the structural health and reliability of structures. A single camer...

The Future Scope of Business Intelligence (BI)

Business intelligence (BI) is a broad category of application on programs and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions. BI appl...

slugFuzzy Logic Controller based Shunt Active Filter

In this analysis Shunt Active Power Filter (APF) is proposed for the compensation of harmonic currents and reactive power. For this purpose, a fuzzy logic controller is developed to adjust the energy storage of the dc v...

2D to 3D Video COnversion

3D video applications becoming popular in our daily life, especially at home entertainment. Although more and more 3D movies are being made, 3D video content are still not rich enough to satisfy the future 3D video mark...

Download PDF file
  • EP ID EP18287
  • DOI -
  • Views 294
  • Downloads 13

How To Cite

Anu Taneja (2014). slugBe Secure with Analytics. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(6), -. https://europub.co.uk/articles/-A-18287