Author of the publication

Nimble cybersecurity incident management through visualization and defensible recommendations.

, , , , , and . VizSEC, page 102-113. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-media information services: a laboratory study., , , , and . IEEE Commun. Mag., 26 (6): 27-33 (1988)The Touring Machine System., , , , , , , , , and 11 other author(s). Commun. ACM, 36 (1): 68-77 (1993)How a good software practice thwarts collaboration: the multiple roles of APIs in software development., , , , and . SIGSOFT FSE, page 221-230. ACM, (2004)Enhancing distributed corporate meetings with lightweight avatars., , , , and . CHI Extended Abstracts, page 3829-3834. ACM, (2010)Identity disclosure and the creation of social capital., and . CHI Extended Abstracts, page 720-721. ACM, (2003)Rendezvous: An Architecture for Synchronous Multi-User Applications, , and . Proceedings of the Conference on Computer-Supported Cooperative Work, page 317-328. Los Angeles, California, ACM, (October 1990)Rendezvous: An Architecture for Synchronous Multi-User Applications., , , and . CSCW, page 317-328. ACM, (1990)Comparing the programming demands of single-user and multi-user applications.. UIST, page 87-94. ACM, (1991)CSCW Overview (Tutorial)., , and . CSCW, page 3. ACM, (1996)Weaving a social fabric into existing software., , , , and . AOSD, page 147-158. ACM, (2005)