Search

Results: 2
Cyber Threat Hunting
Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the...
Published by: IGI Global
Comparing Requirements Analysis Techniques in Business Intelligence and Transactional Contexts
Requirements elicitation is a key concern in information technology (IT) projects. Busi-ness intelligence systems (BI) have emerged and are now used widely in organizations. These systems are designed to support manager's...
Published by: IGI Global