Research Article
Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology
Figure 9
(a) Average response time. (b) Application server processor utilization. (c) Database server processor utilization. (d) Application server memory usage. (e) Database server memory usage.
(a) |
(b) |
(c) |
(d) |
(e) |