Author of the publication

Presenting DEViSE: Data Exchange for Visualizing Security Events.

, , and . IEEE Computer Graphics and Applications, 29 (3): 6-11 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XEON - An Architecture for an XML Enabled Firewall., , and . ICEIS, page 1111-1116. (2002)Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment., and . ECIW, page 9-20. Academic Conferences Limited, Reading, UK, (2005)Forensic cloud environment: a solution for big data forensics., , , and . Int. J. Electron. Secur. Digit. Forensics, 14 (5): 513-533 (2022)Inter-organisational intrusion detection using knowledge grid technology., , and . Inf. Manag. Comput. Secur., 14 (4): 327-342 (2006)Presenting DEViSE: Data Exchange for Visualizing Security Events., , and . IEEE Computer Graphics and Applications, 29 (3): 6-11 (2009)A review of cyber security risk assessment methods for SCADA systems., , , , , , and . Comput. Secur., (2016)Information Assurance - Security in the Information Environment, and . Computer Communications and Networks Springer, (2006)Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection., and . ECIW, page 117-128. Academic Conferences Limited, Reading, UK, (2005)An XML-based architecture for data integration in vulnerability assessments., and . Inf. Manag. Comput. Security, 13 (4): 260-273 (2005)ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements., , , and . COOCS, page 216-227. ACM, (1993)