Interface providing an interactive timeline for evaluating instances of potential network compromise

作者: Sudhakar Muddu , Christos Tryfonas

DOI:

关键词:

摘要:

参考文章(45)
Kieran Gerard Sherlock, Luis Filipe Pereira Valente, Robert Allen Shaw, Geoffrey Cooper, Kevin Cornwall, User interface for a security policy system and method ,(2001)
Phanikumar Patchava, Sandeep Singhal, Walter James Clark, Marc William Solomon, Vineeth Narasimhan, Consolidated security application dashboard ,(2010)
Ganesh Kirti, Kamalendu Biswas, Ramana Rao Satyasai Turlapati, Rohit Gupta, Systems and methods for cloud security monitoring and threat intelligence ,(2014)
Jon Avner, Art Sadovsky, System alert correlation via deltas ,(2014)
Matthias Gander, Michael Felderer, Basel Katt, Adrian Tolbaru, Ruth Breu, Alessandro Moschitti, Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning Trustworthy Eternal Systems via Evolving Software, Data and Knowledge. pp. 103- 116 ,(2013) , 10.1007/978-3-642-45260-4_8
Yunas Nadiadi, Rene Grippo, Allen E. Dixon, Luke P. Philips, Jeff Storey, Eric D. Gundersen, Rajiv K. Singh, Sanjiv Kumar, Wes Jensen, Maria A. Elliott, Peter Cleary, Eric D. Prosser, Imran A. Aslam, Derek Hovodance, Systems and methods for generating customer solutions ,(2014)