From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Visualizing network traffic for intrusion detection.. Conference on Designing Interactive Systems, стр. 363-364. ACM, (2006)Integration of external data sources with cyber security data warehouse., , , , и . CISR, стр. 49-52. ACM, (2014)Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors., , , , и . ICMLA, стр. 437-442. IEEE, (2017)CrossVis: A visual analytics system for exploring heterogeneous multivariate data with applications to materials and climate sciences., , , и . Graph. Vis. Comput., (2020)Introduction to Visualization for Computer Security.. VizSEC, стр. 1-17. Springer, (2007)Visualization is better! A comparative evaluation.. VizSEC, стр. 57-68. IEEE Computer Society, (2009)PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts., , , , , и . ICMLA (2), стр. 60-65. IEEE, (2013)978-0-7695-5144-9.Focusing on Context in Network Traffic Analysis., , , и . IEEE Computer Graphics and Applications, 26 (2): 72-80 (2006)An Evaluation of Visual and Textual Network Analysis Tools.. Inf. Vis., 10 (2): 145-157 (2011)Forming IDEAS Interactive Data Exploration & Analysis System., , , , , и . CoRR, (2018)