Learning From Experts’ Experience: Toward Automated Cyber Security Data Triage | 1 | 0.36 | 2019 |
A threat monitoring system in enterprise networks with smart mobiles | 0 | 0.34 | 2016 |
Demo: A Symbolic N-Variant System. | 0 | 0.34 | 2016 |
Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process | 3 | 0.39 | 2016 |
On simulation studies of jamming threats against LTE networks | 1 | 0.34 | 2015 |
Ontology-based Adaptive Systems of Cyber Defense. | 0 | 0.34 | 2015 |
Directed Multicut with linearly ordered terminals. | 1 | 0.36 | 2014 |
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis | 4 | 0.49 | 2014 |
Comparing Different Moving Target Defense Techniques | 20 | 1.46 | 2014 |
Monitor placement for large-scale systems | 3 | 0.39 | 2014 |
Using security policies to automate placement of network intrusion prevention | 4 | 0.42 | 2013 |
Visualizing graph features for fast port scan detection | 0 | 0.34 | 2013 |
Vulnerability analysis of a smart grid with monitoring and control system | 0 | 0.34 | 2013 |
Visualization design for immediate high-level situational assessment. | 10 | 0.61 | 2012 |
GULv3 - A Novel Tool for Network Managers to Audit Networks. | 0 | 0.34 | 2012 |
Distributed Sensor Objects for Intrusion Detection Systems | 1 | 0.38 | 2012 |
Extending Case-Based Reasoning to Network Alert Reporting | 4 | 0.52 | 2012 |
Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and Repeatability | 0 | 0.34 | 2012 |
A Tri-Linear Visualization For Network Anomaly Detection | 1 | 0.37 | 2011 |
Preparing for the Next Wikileaks: Making Forensics Techniques Work | 0 | 0.34 | 2011 |
Cognitive Task Analysis Of Network Analysts And Managers For Network Situational Awareness | 5 | 0.46 | 2010 |
A multi-phase network situational awareness cognitive task analysis | 15 | 1.04 | 2010 |
Validation for Digital Forensics | 1 | 0.36 | 2010 |
Combining Visualization and Interaction for Scalable Detection of Anomalies in Network Data. | 0 | 0.34 | 2010 |
OleDetection | 0 | 0.34 | 2009 |
Visualization for Rapid Assessment and Projection in Cyber Situational Awareness | 0 | 0.34 | 2009 |
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model | 3 | 0.47 | 2008 |
SÁDI - Statistical Analysis for Data Type Identification | 22 | 1.74 | 2008 |
Identification and Localization of Data Types within Large-Scale File Systems | 18 | 1.53 | 2007 |
Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution | 1 | 0.42 | 2007 |
Improving the computer forensic analysis process through visualization | 22 | 1.63 | 2006 |
Designing Visualization Capabilities for IDS Challenges | 12 | 0.77 | 2005 |
Real-Time Interactive Visual Port Monitoring and Analysis | 0 | 0.34 | 2005 |
Analysis and Management of Intrusion Data Collection | 0 | 0.34 | 2004 |
Analysis And Application Of Node Layout Algorithms For Intrusion Detection | 1 | 0.39 | 2003 |
Computer Forensics Education | 34 | 3.86 | 2003 |
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems | 2 | 0.61 | 2001 |
Guest Editorial: Special Section on Visualization and Data Analysis | 0 | 0.34 | 2000 |
Visualization in Detection of Intrusions and Misuse in Large Scale Networks | 11 | 2.42 | 2000 |
Exploratory visualization research at the University of Massachusetts at Lowell | 2 | 1.11 | 1995 |