Employing Big Data for cyber Attacks Analysis
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3
Abstract
Many enterprises have made substantial investments in security information and event management and log management technologies over the years to collect, manage and analyze logs. Advances in large-scale analytics enable a well-honed security program to use data to spot anomalies and analyze attacks. However, it is easy to be overcome by a deluge of indicators and warnings derived from this data. In this paper I am trying to explore the big data usage in the analysis of cyber-attacks.
Primary Strumal Carcinoid of the Ovary- A Rare Entity
Carcinoid Tumors of the ovary are very rare tumors. They can be either primary or metastatic in origin. Primary ovarian carcinoid tumors can be either a part of a mature cystic teratoma or a pure tumor. We report a case...
Dynamic Modeling of Six Pulse Rectifier Using MATLAB
"A dynamic modeling of thyristor rectifier which is useful for the study of power electronics controlled rectifiers with the help of using MATLAB and SIMULINK is presented in this paper. This dynamic model is very simple...
Study the Quality Assurance of Conventional X-Ray Machine using Non-Invasive KV Meter
This study was carried out to obtain optimum operation conditions for X-ray machines. We investigated some factors affecting on quality assurance of conventional Siemen X-ray machine, in one of Mansoura Hospitals such a...
Lipid Profile of Kashmiri Type 2 Diabetic Patients
This cross sectional study was conducted at Department of Biochemistry, Govt. Medical College Srinagar Kashmir. A total of 120 Kashmiri Type 2 diabetic patients and 30 normal controls were randomly selected. Diabetic dys...
Study of Quirky and Null Cases in Khoibu
This article is an attempt to study two cases of Khoibu in terms of Minimalist Syntax of Generative Grammar. Since an enormous amount of research interest has been recently shown in the study of Quirky and Null Cases, th...