Intranet Anomaly Detection Method Using Flow Mining and Graph Mining
Evidence of malicious activity on the intranet is often hidden in large data streams, such as system logs that accumulate over months or years, whereas data flows are often unbounded, changing, and unlabeled.
SUN Wei, ZHANG Yu
doaj +1 more source
VIEWS OF THE COMPANIES IN CENTRAL REGION REGARDING THE OPPORTUNITIES AND LIMITATIONS OF INFORMATION TECHNOLOGIES USED FOR PROCESSING AND ANALYSIS OF ACCOUNTING INFORMATION [PDF]
In the context of manual processing of data and the transmission of information by conventional means, many of the information valences of accounting remain unexploited because of deficiencies that may occur (delays in processing, redundancy, overloading
ALINA-TEODORA CIUHUREANU
doaj
Internet technology as an environment for information systems development
Development and the organization of the Internet as a global computing network have been discussed including the institutions which provide coordination and functioning of its services.
Miloš Pejanović
doaj +1 more source
Системы обнаружения атак для защиты Интранет [PDF]
System of detection of attacks - perspective technology of protection of information resources of networks Intranet, which receives more and more wide circulation in the conducting countries of the world and on Ukraine. The recommendations for Intranet -
Шорошев, Вячеслав
core
Les intranets sont à la mode. Ils apparaissent en effet souples d'usage et particulièrement adaptés à la grande variété des formes d'organisations qui les adoptent. Paradoxalement, cette flexibilité rend leur analyse particulièrement délicate car le terme d'intranet recouvre une très grande variété de solutions techniques et donne lieu à une ...
+6 more sources
Este artigo investiga aspectos característicos da produção de software para ambiente Web. É feito um estudo de caso visando entender como se dá a produção de aplicações Web com elevado grau de interatividade com o usuário e funcionalidade complexa.
Rodrigo Franco Gonçalves +3 more
doaj +1 more source
The study of using information and communication technology in Hungary and in the 27 countries of the EU [PDF]
The rate of personal computers and workstations in the 27 countries of the EU reached 96 %. The biggest backlog can be observed in the number of enterprises having and maintaining a website. Hungary's rate of 47 % is less than the EU average by 13 % and
Sasvári, Péter László
core
The Strategic Role of Marketing Communication in he SME: the Case of Fornari SpA [PDF]
In this paper we discuss the strategic importance of communication and Intranet for theItalian Small and Medium Enterprise (SMEs). We analyse the case of Fornari SpA, an Italian medium size clothing and shoes manufacturer that uses internet as a ...
Andrea Buratti, Marco Cioppi
core
Launching an Intranet in LibGuides CMS at the Georgia Southern University Libraries
During the 2021-22 academic year, the Georgia Southern University Libraries launched an intranet within the LibGuides CMS (LibGuides) platform. While LibGuides had been in use at Georgia Southern for more than 10 years, it was used most heavily by the ...
Wilhelmina Randtke
doaj
Onboarding during the COVID-19 and the future of onboarding within a South African municipality
Orientation: Limited literature on onboarding during COVID-19 and the future of onboarding exists. Research purpose: The purpose of this study was to explore the implementation of employee onboarding during COVID-19, as well as the future of onboarding ...
Jean Oberholzer +2 more
doaj +1 more source

