|
Volumn , Issue , 2008, Pages 19-37
|
The real work of computer network defense analysts the analysis roles and processes that transform network data into security situation awareness
a b |
Author keywords
[No Author keywords available]
|
Indexed keywords
DATA FUSION;
DIAMONDS;
JOB ANALYSIS;
SECURITY SYSTEMS;
VISUALIZATION;
ANALYTIC CONCLUSION;
ANALYTICAL PROCESS;
COGNITIVE DEMANDS;
COGNITIVE TASK ANALYSIS;
MULTIPLE DATA SOURCES;
SECURITY SITUATION;
STATE OF THE PRACTICE;
U.S. DEPARTMENT OF DEFENSE;
SECURITY OF DATA;
|
EID: 84898916485
PISSN: 16123786
EISSN: 2197666X
Source Type: Book Series
DOI: 10.1007/978-3-540-78243-8_2 Document Type: Conference Paper |
Times cited : (28)
|
References (11)
|