Zobrazeno 1 - 2
of 2
pro vyhledávání: '"G. David Richardson"'
Conducting data analysis tasks rarely occur in isolation. Especially in intelligence analysis scenarios where different experts contribute knowledge to a shared understanding, members must communicate how insights develop to establish common ground a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8e7a64ec2f441a5f067e6fe32bbb6d9f
Autor:
Kelly M. T. Huffer, Robert A. Bridges, Chad A. Steed, G. David Richardson, Jason A. Laska, Eric D. Ragan, Joel W. Reed, John R. Goodall
Publikováno v:
IEEE transactions on visualization and computer graphics.
Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the disclosure of state secrets, and major financial damages. Anomaly detection methods are ben