1. A learning system for discriminating variants of malicious network traffic;Beaver,2013
2. 7 Key challenges for visualization in cyber network defense;Best,2014
3. Detection of anomalous insiders in collaborative;Chen,2011
4. Detecting insider activity using enhanced directory virtualization;Claycomb,2010
5. Bringing knowledge to network defense;Flagg,2007