Emoji-nized Log Browser: Visualization of Server-logs by ...電気通信大学
www.az.inf.uec.ac.jp
von T Takada · · Zitiert von: 3 — Dörk, J. Landstorfer, and R. Wettach Visual Filter: Graphical. Exploration of Network Security Log Files. In Proc. of the Eleventh Workshop on. von T Takada · · Zitiert von: 3 — Dörk, J. Landstorfer, and R. Wettach Visual Filter: Graphical. Exploration of Network Security Log Files. In Proc. of the Eleventh Workshop on.
Exploring the Representation of Cyber-Risk Data Through ...Lancaster EPrints
eprints.lancs.ac.uk
[28] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... [28] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Understanding the Context of Network Traffic Alertsbramcappers.nl
www.bramcappers.nl
von BCM Cappers · Zitiert von: 44 — [15] J. Landstorfer, I. Herrmann, J. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... von BCM Cappers · Zitiert von: 44 — [15] J. Landstorfer, I. Herrmann, J. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Visual Analytics for Situational Awareness in Cyber SecurityScibib
bib.dbvis.de
Dörk, J. Landstorfer, and R. Wettach. Visual Filter: Graphi- cal Exploration of Network Security Log Files. In Proceedings of the Eleventh. Workshop on ... Dörk, J. Landstorfer, and R. Wettach. Visual Filter: Graphi- cal Exploration of Network Security Log Files. In Proceedings of the Eleventh. Workshop on ...
Sichtbarkeit und Sichtbarmachung. Hybride Formen GEPRISDFG - GEPRIS
gepris.dfg.de
/ J. Landstorfer / R. Wettach / J. Werner; (2012): »Reise in die Gegenwart«. Text zur Ausstellung »Etna Carrara«, Ludwig Forum für Internationale Kunst J. Landstorfer / R. Wettach / J. Werner; (2012): »Reise in die Gegenwart«. Text zur Ausstellung »Etna Carrara«, Ludwig Forum für Internationale Kunst ...
Visual Analytics for Decomposing Temporal Event Series ...Uni DUE
vis.informatik.uni-due.de
von D Herr · Zitiert von: 15 — [19] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... von D Herr · Zitiert von: 15 — [19] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Visual Analytics for Situational Awareness in Cyber SecurityUniversität Konstanz
kops.uni-konstanz.de
Dörk, J. Landstorfer, and R. Wettach. Visual Filter: Graphi- cal Exploration of Network Security Log Files. In Proceedings of the Eleventh. Workshop on ... Dörk, J. Landstorfer, and R. Wettach. Visual Filter: Graphi- cal Exploration of Network Security Log Files. In Proceedings of the Eleventh. Workshop on ...
Multimodal and Collaborative Interaction for Visual Data ...Media SuUB Bremen
media.suub.uni-bremen.de
— [106] J. Landstorfer, I. Herrmann, J. Stange, M. Dörk, and R. Wettach. “Weav- ing a carpet from log entries: A network security — [106] J. Landstorfer, I. Herrmann, J. Stange, M. Dörk, and R. Wettach. “Weav- ing a carpet from log entries: A network security ...
Exploratory Analysis of File System Metadata for Rapid ...ResearchGate
www.researchgate.net
J Landstorfer; R Wettach. J.-E. Stange, M. Dörk, J. Landstorfer, and R. Wettach. Visual filter: graphical exploration of network security log files. In ... J Landstorfer; R Wettach. J.-E. Stange, M. Dörk, J. Landstorfer, and R. Wettach. Visual filter: graphical exploration of network security log files. In ...
THESE DE DOCTORAT DE
www.theses.fr
von A Cantu · — [65] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dörk, and R. Wettach. Weaving a carpet from log entries : A network security visualization built with ... › abes
learning | interaction design
interactiondesign.wordpress.com
Posts about learning written by reto wettach
Alle Infos zum Namen "J. Landstorfer"
Developing Visualisations to Enhance an Insider Threat ...Napier
www.napier.ac.uk
von M Graham · Zitiert von: 5 — [27] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ... von M Graham · Zitiert von: 5 — [27] J. Landstorfer, I. Herrmann, J.-E. Stange, M. Dork, and R. Wettach. Weaving a carpet from log entries: A network security visualization built with co ...
Methodological Primitives for Phased Construction of Data ...Academia.edu
www.academia.edu
Dörk, J. Landstorfer, and R. Wettach. Visual filter: Graphical exploration of network security log files. In Proc. of the 11th Workshop on Visualization for ... Dörk, J. Landstorfer, and R. Wettach. Visual filter: Graphical exploration of network security log files. In Proc. of the 11th Workshop on Visualization for ...
A network security visualization built with co-creation
www.semanticscholar.org
J. Landstorfer, Ivo Herrmann, +2 authors. R. Wettach; Published 1 October 2014; Computer Science; IEEE Conference on Visual Analytics Science and ... › ...
Ohne Titel
hal.inria.fr
J. Landstorfer, I. Herrmann, J. Stange, M. Dörk, and R. Wettach, Weaving a carpet from log entries : A network security visualization built with co-creation ... › html_references
Обзор методологических примитивов для поэтапного ...
www.mathnet.ru
von МВ Коломеец · · Zitiert von: 30 — Stange J., Dörk J., Landstorfer J., Wettach R. Visual Filter: Graphical Exploration of. Network Security Log Files // VizSec '14 Proceedings of the Eleventh ... › php › getFT
Verwandte Suchanfragen zu J. Landstorfer
Personen Vorname Name "Landstorfer" (88) |
sortiert nach Relevanz / Datum