135
Voted
VIZSEC
15 years 7 months ago
2007 Springer 131
click to vote
VIZSEC
15 years 7 months ago
2007 Springer
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
120
click to vote
VIZSEC
15 years 7 months ago
2007 Springer
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
117
click to vote
VIZSEC
15 years 7 months ago
2007 Springer
This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using ...
119
click to vote
VIZSEC
15 years 7 months ago
2007 Springer
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
|