Author of the publication

Visual Correlation of Host Processes and Network Traffic.

, , and . VizSEC, page 2. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures., , , , , , , , and . SafeConfig@CCS, page 55-58. ACM, (2015)Shopping for danger e-commerce techniques applied to collaboration in cyber security., and . CTS, page 251-258. IEEE, (2012)Who's the Boss? Autonomics and New-Fangled Security Gizmos with Minds of Their Own.. LISA, USENIX, (2007)Visual Correlation of Host Processes and Network Traffic., , and . VizSEC, page 2. IEEE Computer Society, (2005)Bridging the Host-Network Divide: Survey, Taxonomy, and Solution., , , and . LISA, page 247-262. USENIX, (2006)Ants, To-Go: A Portable Demonstration of Large Infrastructure Cyber Defense., , and . SASO Workshops, page 11-12. IEEE Computer Society, (2013)A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems., , , and . IPDPS, IEEE Computer Society, (2002)Ant-Based Cyber Security., , , , , and . ITNG, page 918-926. IEEE Computer Society, (2011)Using Set-Based Heading to Improve Mobile Agent Movement., , , , and . SASO, page 120-128. IEEE Computer Society, (2014)Helping IT and OT Defenders Collaborate., and . CoRR, (2019)