Author of the publication

I know my network: collaboration and expertise in intrusion detection.

, , and . CSCW, page 342-345. ACM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualizing network traffic for intrusion detection.. Conference on Designing Interactive Systems, page 363-364. ACM, (2006)CrossVis: A visual analytics system for exploring heterogeneous multivariate data with applications to materials and climate sciences., , , and . Graph. Vis. Comput., (2020)Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors., , , , and . ICMLA, page 437-442. IEEE, (2017)Integration of external data sources with cyber security data warehouse., , , , and . CISR, page 49-52. ACM, (2014)Introduction to Visualization for Computer Security.. VizSEC, page 1-17. Springer, (2007)Visualization is better! A comparative evaluation.. VizSEC, page 57-68. IEEE Computer Society, (2009)The Work of Intrusion Detection: Rethinking the Role of Security Analysts., , and . AMCIS, page 179. Association for Information Systems, (2004)Visualizing Cascading Failures in Critical Cyber Infrastructures., , and . Critical Infrastructure Protection, volume 253 of IFIP, page 351-364. Springer, (2007)Developing an Ontology for Cyber Security Knowledge Graphs., , , , , , , and . CISR, page 12:1-12:4. ACM, (2015)Towards a Relation Extraction Framework for Cyber-Security Concepts., , , and . CISR, page 11:1-11:4. ACM, (2015)