Author of the publication

A Strategy for Effective Alert Analysis at a Cyber Security Operations Center.

, and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 206-226. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System., , , , and . CoRR, (2018)A Strategy for Effective Alert Analysis at a Cyber Security Operations Center., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 206-226. Springer, (2018)Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility., , , , and . IEEE Syst. J., 15 (1): 835-845 (2021)Work in progress - SUNRISE: Schools, university 'N' (and) resources in the sciences and engineering-a NSF/GMU GK-12 fellows project., , and . FIE, page 3. IEEE Computer Society, (2011)VULCON: A System for Vulnerability Prioritization, Mitigation, and Management., , , , and . ACM Trans. Priv. Secur., 21 (4): 16:1-16:28 (2018)Work in progress: STEM capacity building and STEM outreach in India: A report on a recent NSF sponsored GK-12 George Mason trip to India., , and . FIE, page 1-2. IEEE Computer Society, (2012)Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk., , and . ACM TIST, 8 (4): 52:1-52:32 (2017)Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System., , , , and . ACM Trans. Intell. Syst. Technol., 11 (3): 32:1-32:20 (2020)Optimizing Alert Data Management Processes at a Cyber Security Operations Center., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)