Research Article

Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology

Figure 9

(a) Average response time. (b) Application server processor utilization. (c) Database server processor utilization. (d) Application server memory usage. (e) Database server memory usage.
(a)
(b)
(c)
(d)
(e)