2025-02-22T10:19:19-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22irk-123456789-188663%22&qt=morelikethis&rows=5
2025-02-22T10:19:19-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22irk-123456789-188663%22&qt=morelikethis&rows=5
2025-02-22T10:19:19-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T10:19:19-05:00 DEBUG: Deserialized SOLR response
Development of decision support system using OLAP-technologies for information security monitoring systems
The article highlighted the need for continuous monitoring of the computer networks (CN) for information security and analyzed the sources of data for information security monitoring (ISM). Methods of data collection from various sources have been investigated, and categories of ISM systems have bee...
Saved in:
Main Author: | Dashdamirova, K.Q. |
---|---|
Format: | Article |
Language: | English |
Published: |
Інститут програмних систем НАН України
2022
|
Series: | Проблеми програмування |
Subjects: | |
Online Access: | http://dspace.nbuv.gov.ua/handle/123456789/188663 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
2025-02-22T10:19:20-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&rows=40&rows=5&wt=json&json.nl=arrarr&q=id%3A%22irk-123456789-188663%22&qt=morelikethis
2025-02-22T10:19:20-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&rows=40&rows=5&wt=json&json.nl=arrarr&q=id%3A%22irk-123456789-188663%22&qt=morelikethis
2025-02-22T10:19:20-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T10:19:20-05:00 DEBUG: Deserialized SOLR response
Similar Items
-
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2012) -
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2022) -
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building
by: Ogurtsov, M.I.
Published: (2022) -
Виявлення бонет-трафіку на основі потоків, використовуючи ШІ
by: Панчук, Б.А.
Published: (2022) -
Захист відкритих клієнтів за допомогою одного алгоритму авторизації
by: Бодак, Б.В., et al.
Published: (2022)