Situ : Identifying and Explaining Suspicious Behavior in Networks

Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the disclosure of state secrets, and major financial damages. Anomaly detection methods are beneficial for detecting new types of attacks and abn...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on visualization and computer graphics. - 1996. - (2018) vom: 20. Aug.
1. Verfasser: Goodall, John R (VerfasserIn)
Weitere Verfasser: Ragan, Eric D, Steed, Chad A, Reed, Joel W, Richardson, G David, Huffer, Kelly M T, Bridges, Robert A, Laska, Jason A
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2018
Zugriff auf das übergeordnete Werk:IEEE transactions on visualization and computer graphics
Schlagworte:Journal Article