Author of the publication

Visualization of Intrusion Detection Alarms Collected from Multiple Networks.

, , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 437-454. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualization of Intrusion Detection Alarms Collected from Multiple Networks., , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 437-454. Springer, (2017)Visualization of security event logs across multiple networks and its application to a CSOC., , , and . Clust. Comput., 22 (Suppl 1): 1861-1872 (2019)Enhanced Sinkhole System by Improving Post-processing Mechanism., , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 469-480. Springer, (2010)A Practical Methodology and Framework for Comprehensive Incident Handling Focused on Bot Response., , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 481-492. Springer, (2010)A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software., , , and . AsiaJCIS, page 5-9. IEEE Computer Society, (2017)Multimedia applications for intelligent fusion computing., , and . Multim. Tools Appl., 74 (10): 3273-3276 (2015)Automated Verification Methodology of Security Events Based on Heuristic Analysis., , , , , and . Int. J. Distributed Sens. Networks, (2015)SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 458-467. Springer, (2005)A Malware Collection and Analysis Framework Based on Darknet Traffic., , and . ICONIP (2), volume 7664 of Lecture Notes in Computer Science, page 624-631. Springer, (2012)A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic., , , and . Secur. Commun. Networks, 7 (10): 1612-1621 (2014)