Author of the publication

Real-time visualization of network behaviors for situational awareness.

, , , , and . VizSEC, page 79-90. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures., , , , , , , , and . SafeConfig@CCS, page 55-58. ACM, (2015)CyberPetri at CDX 2016: Real-time network situation awareness., , , and . VizSEC, page 1-4. IEEE Computer Society, (2016)Atypical behavior identification in large-scale network traffic., , , and . LDAV, page 15-22. IEEE Computer Society, (2011)Ocelot: user-centered design of a decision support visualization for network quarantine., , , , , , and . VizSEC, page 1-8. IEEE Computer Society, (2015)The Scalable Reasoning System: Lightweight visualization for distributed analytics., , , , , , , , and . IEEE VAST, page 131-138. IEEE Computer Society, (2008)Stepping out of Flatland: Discovering Behavior Patterns as Topological Structures in Cyber Hypergraphs., , , , , , , , , and 2 other author(s). CoRR, (2023)The Scalable Reasoning System: Lightweight visualization for distributed analytics., , , , , , , , and . Inf. Vis., 8 (1): 71-84 (2009)GWVis: A tool for comparative ground-water data visualization., and . Comput. Geosci., 36 (11): 1436-1442 (2010)Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data., , , , , , , , , and 1 other author(s). CoRR, (2023)Malicious Cyber Activity Detection using Zigzag Persistence., , , , , , , , , and 1 other author(s). DSC, page 1-8. IEEE, (2023)