Event data

Results: 1868



#Item
711Computer law / Credit cards / Data privacy / Payment systems / Payment Card Industry Data Security Standard / Event Viewer / Group Policy / Windows Security Log / Information technology security audit / Microsoft Windows / Computing / Computer security

White Paper PCI Guidance: Microsoft Windows Logging White Paper

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-11 08:13:12
712

Discovering Novel Anomalous Patterns in General Data Edward McFowland III () PhD Candidate Event & Pattern Detection Lab

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2014-11-03 16:52:22
    713Data management / Formal sciences / Computer security / Analytics / Mathematical finance / Security information and event management / Big data / Apache Hadoop / Security event manager / Technology / Business intelligence / Computing

        DATASHEET SQRRL ENTERPRISE BIG DATA SECURITY ANALYTICS USE CASE

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2014-10-07 15:54:16
    714Data analysis / Data mining

    StarScan: A Novel Scan Statistic for Irregularly-Shaped Spatial Clusters Sriram Somanchi, David Choi, Daniel B. Neill Event and Pattern Detection Laboratory

    Add to Reading List

    Source URL: www.cs.cmu.edu

    Language: English - Date: 2015-03-10 23:34:33
    715Data mining / Image processing

    Efficient Subset Scanning with Soft Constraints Daniel B. Neill Event and Pattern Detection Laboratory H.J. Heinz III College, Carnegie Mellon University

    Add to Reading List

    Source URL: www.cs.cmu.edu

    Language: English - Date: 2013-05-30 15:20:08
    716Network management / Internet Protocol / Computer network security / Lumeta Corporation / IPv6 / Network security / Simple Network Management Protocol / Security information and event management / Internet Mapping Project / Computing / Network architecture / Internet

    DATA SHEET Enterprise Situational Intelligence You can attain a real-time, dynamic view of your network infrastructure using Lumeta® ESI. Running in an always-on mode, ESI delivers next-generation network discovery, le

    Add to Reading List

    Source URL: www.lumeta.com

    Language: English - Date: 2014-07-11 16:11:09
    717Cyberwarfare / Information Risk Management / Actuarial science / Risk management / Security information and event management / Vulnerability / Risk / Threat / Security management / Computer security / Data security / Security

    Manage Security and Risk Solution Guide

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2014-09-02 13:57:15
    718Cyberwarfare / Computing / Computer network security / Security information and event management / Threat / McAfee VirusScan / McAfee SiteAdvisor / McAfee / Computer security / Companies listed on the New York Stock Exchange

    Data Sheet McAfee Global Threat Intelligence for Enterprise Security Manager Bring the power of McAfee® Labs™ to situational awareness.

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2014-09-29 21:17:39
    719Research methods / Scientific method / Econometrics / Statistical methods / Regression analysis / Analysis / Survival analysis / Data analysis / Linear regression / Statistics / Science / Information

    Event History and Survival Analysis This course offers an introduction to event history analysis, a family of statistical methods that have become increasingly popular in the social sciences. Event history analysis is a

    Add to Reading List

    Source URL: www.fas.nus.edu.sg

    Language: English - Date: 2015-02-17 00:54:16
    720

    Enhancement of the Event Management System - briefing session For the Attention of Event Organizers in All Departments/Units In the last triennium, data on public events were collected from Faculties and non-Faculty-bas

    Add to Reading List

    Source URL: www.ke.hku.hk

    Language: English
      UPDATE