User interfaces for presenting cybersecurity data

作者: Nachenberg Carey Stover , Naghibzadeh Shapor , Telles Bernardo Malta Leite

DOI:

关键词:

摘要:

参考文章(10)
Reed Sturtevant, William Gross, Thomas McGovern, Search engine using user intent ,(2005)
Kieran G. Sherlock, Geoffrey Cooper, Mark Hoy, Method and apparatus for rate limiting ,(2003)
Félix Iglesias, Tanja Zseby, Analysis of network traffic features for anomaly detection Machine Learning. ,vol. 101, pp. 59- 84 ,(2015) , 10.1007/S10994-014-5473-9
Sathiapriya Sathiyagiri, Murthy N. Bhetanabhotla, David B. Hamilton, Ning Zhou, Prakash Kaligotla, Suresh Muthu, Minimized display of monitored events with live severity level and count indications ,(2013)
Grégory Mermoud, Jean-Philippe Vasseur, Laurent Sartran, Anomaly detection using network traffic data ,(2016)
Adil Atifi, Elias Bou-Harb, On correlating network traffic for cyber threat intelligence: A Bloom filter approach 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). pp. 384- 389 ,(2017) , 10.1109/IWCMC.2017.7986317