Putting security in context: Visual correlation of network activity with real-world information

VizSEC 2007: Proceedings of the Workshop on … - Springer
To effectively identify and respond to cyber threats, computer security analysts must
understand the scale, motivation, methods, source, and target of an attack. Central to …

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information

WA Pike, C Scherrer, SJ Zabriskie - 2008 - osti.gov
To effectively identify and respond to cyber threats, computer security analysts must
understand the scale, motivation, methods, source, and target of an attack. Central to …

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information

WA Pike, C Scherrer, S Zabriskie - VizSEC 2007 - Springer
To effectively identify and respond to cyber threats, computer security analysts must
understand the scale, motivation, methods, source, and target of an attack. Central to …

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information

WA Pike, C Scherrer, S Zabriskie - VizSEC 2007: Proceedings of …, 2008 - books.google.com
To effectively identify and respond to cyber threats, computer security analysts must
understand the scale, motivation, methods, source, and target of an attack. Central to …

[引用][C] Putting Security in Context: Visual Correlation of Network Activity with Real-World Information

WA Pike, C Scherrer, S Zabriskie - VizSEC 2007, 2008 - Springer