Analysis of the contribution of machine learning to information security
Every computing device has its own security logs. Byaggregating thousands of devices that intervene in thecommunications of personal computers, databases, webservers, network devices, firewalls, etc., a large volume oflogs is generated with interesting information from thesecurity point of view, alt...
Збережено в:
| Автори: | , , , , |
|---|---|
| Формат: | Online |
| Мова: | spa |
| Опубліковано: |
Corporación universitaria Americana
2021
|
| Предмети: | |
| Онлайн доступ: | https://publicaciones.americana.edu.co/index.php/inam/article/view/407 |
| Теги: |
Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
|