Author of the publication

Countering Security Information Overload through Alert and Packet Visualization.

, , , , , , , and . IEEE Computer Graphics and Applications, 26 (2): 60-70 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging SDN and WebRTC for Rogue Access Point Security., , and . IEEE Trans. Network and Service Management, 14 (3): 756-770 (2017)QoS support for UDP/TCP based networks., , , and . Comput. Commun., 24 (1): 64-77 (2001)A pricing approach for bandwidth allocation in differentiated service networks., , , and . Comput. Oper. Res., 35 (12): 3769-3786 (2008)University methodology for internetworking principles and design projects., , and . IEEE Trans. Educ., 46 (2): 218-225 (2003)Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table., , and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 369-384. Springer, (2004)Synchronous Digital Hierarchy Optical Metropolitan Network Ring Traffic Analysis., and . Eur. Trans. Telecommun., 4 (6): 591-597 (1993)Mapping Wander in SONET/SDH Adaptive Threshold Modulation Pointer Processors., , and . ICC (3), page 1587-1591. IEEE, (1997)Temporal Partitioning for Partially-Reconfigurable-Field-Programmable Gate., and . IPPS/SPDP Workshops, volume 1388 of Lecture Notes in Computer Science, page 37-42. Springer, (1998)M-MPLS: Micromobility-enabled multiprotocol label switching., , , , , and . ICC, page 250-255. IEEE, (2003)A comparison of auction and flat pricing for differentiated service networks., , and . ICC, page 2086-2091. IEEE, (2004)