118
click to vote
VIZSEC
15 years 6 months ago
2007 Springer
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
105
click to vote
VIZSEC
15 years 6 months ago
2007 Springer
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
105
click to vote
VIZSEC
15 years 6 months ago
2007 Springer
This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using ...
113
click to vote
VIZSEC
15 years 6 months ago
2007 Springer
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
|