Situ : Identifying and Explaining Suspicious Behavior in Networks
Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the disclosure of state secrets, and major financial damages. Anomaly detection methods are beneficial for detecting new types of attacks and abn...
Ausführliche Beschreibung
Bibliographische Detailangaben
Veröffentlicht in: | IEEE transactions on visualization and computer graphics. - 1996. - (2018) vom: 20. Aug.
|
1. Verfasser: |
Goodall, John R
(VerfasserIn) |
Weitere Verfasser: |
Ragan, Eric D,
Steed, Chad A,
Reed, Joel W,
Richardson, G David,
Huffer, Kelly M T,
Bridges, Robert A,
Laska, Jason A |
Format: | Online-Aufsatz
|
Sprache: | English |
Veröffentlicht: |
2018
|
Zugriff auf das übergeordnete Werk: | IEEE transactions on visualization and computer graphics
|
Schlagworte: | Journal Article |