Security visualization infrastructures, techniques, and methodologies for improved enterprise security

FF Özdemir Sönmez - 2019 - open.metu.edu.tr
… using OWASP Zed Attack Proxy vulnerability scanner tool. This design allows investigation
… to monitor a single security analysis result or consecutive analysis results and the changes …