Exploring the Representation of Cyber-Risk Data Through ...Lancaster EPrints
eprints.lancs.ac.uk
[28] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... [28] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Understanding the Context of Network Traffic Alertsbramcappers.nl
www.bramcappers.nl
von BCM Cappers · Zitiert von: 44 — [15] J. Landstorfer, I. Herrmann, J. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... von BCM Cappers · Zitiert von: 44 — [15] J. Landstorfer, I. Herrmann, J. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
a comparative study toward a security visualization methodologyPolitecnico di Torino
webthesis.biblio.polito.it
von S Cavallo · — [36] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach, “Weaving a car- pet from log entries: A network security visualization built with ... von S Cavallo · — [36] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach, “Weaving a car- pet from log entries: A network security visualization built with ...
arXiv: v1 [cs.HC] 17 Sep 2021
arxiv.org
von M Graham · — [27] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization. › pdf
Visual Analytics for Decomposing Temporal Event Series ...Uni DUE
vis.informatik.uni-due.de
von D Herr · Zitiert von: 15 — [19] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... von D Herr · Zitiert von: 15 — [19] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Multimodal and Collaborative Interaction for Visual Data ...Media SuUB Bremen
media.suub.uni-bremen.de
— [106] J. Landstorfer, I. Herrmann, J. Stange, M. Dörk, and R. Wettach. “Weav- ing a carpet from log entries: A network security — [106] J. Landstorfer, I. Herrmann, J. Stange, M. Dörk, and R. Wettach. “Weav- ing a carpet from log entries: A network security ...
Visual Analytics for Decomposing Temporal Event Uni-DUE
www.vis.wiwi.uni-due.de
von D Herr · Zitiert von: 14 — [19] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization. › fileadmin › file
Visual Analytics for Situational Awareness in Cyber Security
kops.uni-konstanz.de
[151] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with ... › Fischer_
Exploratory Analysis of File System Metadata for Rapid ...ResearchGate
www.researchgate.net
J Landstorfer; R Wettach. J.-E. Stange, M. Dörk, J. Landstorfer, and R. Wettach. Visual filter: graphical exploration of network security log files. In ... J Landstorfer; R Wettach. J.-E. Stange, M. Dörk, J. Landstorfer, and R. Wettach. Visual filter: graphical exploration of network security log files. In ...
THESE DE DOCTORAT DE
www.theses.fr
von A Cantu · — [65] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries : A network security visualization built with ... › abes
Alle Infos zum Namen "J. Landstorfer"
Developing Visualisations to Enhance an Insider Threat ...Napier
www.napier.ac.uk
von M Graham · Zitiert von: 5 — [27] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... von M Graham · Zitiert von: 5 — [27] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Ohne Titel
hal.inria.fr
J. Landstorfer, I. Herrmann, J. Stange, M. Dörk, and R. Wettach, Weaving a carpet from log entries : A network security visualization built with co-creation ... › html_references
Обзор методологических примитивов для поэтапного ...
www.mathnet.ru
von МВ Коломеец · · Zitiert von: 30 — Stange J., Dörk J., Landstorfer J., Wettach R. Visual Filter: Graphical Exploration of. Network Security Log Files // VizSec '14 Proceedings of the Eleventh ... › php › getFT
Verwandte Suchanfragen zu J. Landstorfer
Personen Vorname Name "Landstorfer" (88) |
sortiert nach Relevanz / Datum