Exploring the Representation of Cyber-Risk Data Through ...Lancaster EPrints
eprints.lancs.ac.uk
[28] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... [28] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Understanding the Context of Network Traffic Alertsbramcappers.nl
www.bramcappers.nl
von BCM Cappers · Zitiert von: 44 — [15] J. Landstorfer, I. Herrmann, J. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... von BCM Cappers · Zitiert von: 44 — [15] J. Landstorfer, I. Herrmann, J. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Unlocking User-Centered Design Methods for Building ...Miriah Meyer
miriah.github.io
von S McKenna · Zitiert von: 98 — [21] J. Landstorfer. Weaving a carpet from log entries: A network security vi- sualization built with co-creation. In Proceedings of the IEEE Conference on ... von S McKenna · Zitiert von: 98 — [21] J. Landstorfer. Weaving a carpet from log entries: A network security vi- sualization built with co-creation. In Proceedings of the IEEE Conference on ...
a comparative study toward a security visualization methodologyPolitecnico di Torino
webthesis.biblio.polito.it
von S Cavallo · — [36] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach, “Weaving a car- pet from log entries: A network security visualization built with ... von S Cavallo · — [36] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach, “Weaving a car- pet from log entries: A network security visualization built with ...
Ohne TitelArchive ouverte HAL
hal.science
Lam, Seven guiding scenarios for information visualization evaluation, URL : https://hal.archives-ouvertes.fr/hal J. Landstorfer, Weaving a ... Lam, Seven guiding scenarios for information visualization evaluation, URL : https://hal.archives-ouvertes.fr/hal J. Landstorfer, Weaving a ...
Visual Analytics for Decomposing Temporal Event Series ...Uni DUE
vis.informatik.uni-due.de
von D Herr · Zitiert von: 15 — [19] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... von D Herr · Zitiert von: 15 — [19] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Visual Analytics for Decomposing Temporal Event Uni-DUE
www.vis.wiwi.uni-due.de
von D Herr · Zitiert von: 14 — [19] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization. › fileadmin › file
Visual Analytics for Situational Awareness in Cyber Security
kops.uni-konstanz.de
[151] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with ... › Fischer_
THESE DE DOCTORAT DE
www.theses.fr
von A Cantu · — [65] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries : A network security visualization built with ... › abes
Alle Infos zum Namen "J. Landstorfer"
Developing Visualisations to Enhance an Insider Threat ...Napier
www.napier.ac.uk
von M Graham · Zitiert von: 5 — [27] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... von M Graham · Zitiert von: 5 — [27] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Ohne Titel
hal.inria.fr
J. Landstorfer, I. Herrmann, J. Stange, M. Dörk, and R. Wettach, Weaving a carpet from log entries : A network security visualization built with co-creation ... › html_references
Ohne Titel
hal.archives-ouvertes.fr
J. Landstorfer, Weaving a carpet from log entries: A network security visualization built with co-creation, IEEE Conference on Visual Analytics Science ... › ht...
Unlocking User-Centered Design Methods for Building Cyber ...
www.hsdl.org
[21] J. Landstorfer. Weaving a carpet from log entries: A network security vi- sualization built with co-creation. In Proceedings of the IEEE Conference. › view
Verwandte Suchanfragen zu J. Landstorfer
Personen Vorname Name "Landstorfer" (88) |
sortiert nach Relevanz / Datum