Author:
Goodall J.R.,Lutters W.G.,Rheingans P.,Komlodi A.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Prioritizing vulnerability patches in large networks;Expert Systems with Applications;2022-05
2. Anomalous network communication detection system by visual pattern on a client computer;Proceedings of the 30th Annual ACM Symposium on Applied Computing;2015-04-13
3. VAFLE: visual analytics of firewall log events;SPIE Proceedings;2013-12-23
4. Massive scale cyber traffic analysis;First International Workshop on Graph Data Management Experiences and Systems;2013-06-23
5. Command line or pretty lines?;Proceedings of the SIGCHI Conference on Human Factors in Computing Systems;2007-04-29