|
Volumn 2005, Issue , 2005, Pages 58-63
|
Closing-the-loop: Discovery and search in security visualizations
a,b a a a |
Author keywords
[No Author keywords available]
|
Indexed keywords
NETWORK LOGS;
SECURITY ENGINEERS;
SECURITY VISUALIZATION TOOLS;
SECURITY VISUALIZATIONS;
COMPUTATIONAL METHODS;
COMPUTER CRIME;
COMPUTER NETWORKS;
COMPUTER SCIENCE;
CYBERNETICS;
DATA REDUCTION;
PATTERN RECOGNITION;
SECURITY OF DATA;
VISUALIZATION;
SECURITY SYSTEMS;
|
EID: 33745467523
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/IAW.2005.1495934 Document Type: Conference Paper |
Times cited : (9)
|
References (10)
|