Zobrazeno 1 - 10
of 389
pro vyhledávání: '"Goodall, John"'
Autor:
Block, Jeremy E., Esmaeili, Shaghayegh, Ragan, Eric D., Goodall, John R., Richardson, G. David
Publikováno v:
IEEE Transactions on Visualization and Computer Graphics 2022
Conducting data analysis tasks rarely occur in isolation. Especially in intelligence analysis scenarios where different experts contribute knowledge to a shared understanding, members must communicate how insights develop to establish common ground a
Externí odkaz:
http://arxiv.org/abs/2208.03900
Autor:
Oesch, Sean, Bridges, Robert, Smith, Jared, Beaver, Justin, Goodall, John, Huffer, Kelly, Miles, Craig, Scofield, Dan
Gartner, a large research and advisory company, anticipates that by 2024 80% of security operation centers (SOCs) will use machine learning (ML) based solutions to enhance their operations. In light of such widespread adoption, it is vital for the re
Externí odkaz:
http://arxiv.org/abs/2012.09013
Modern security operations centers (SOCs) employ a variety of tools for intrusion detection, prevention, and widespread log aggregation and analysis. While research efforts are quickly proposing novel algorithms and technologies for cyber security, a
Externí odkaz:
http://arxiv.org/abs/1812.02867
Autor:
Bridges, Robert A., Vincent, Maria A., Huffer, Kelly M. T., Goodall, John R., Jamieson, Jessie D., Burch, Zachary
Publikováno v:
Workshop on Information Security Workers, USENIX SOUPS 2018
Modern cyber security operations collect an enormous amount of logging and alerting data. While analysts have the ability to query and compute simple statistics and plots from their data, current analytical tools are too simple to admit deep understa
Externí odkaz:
http://arxiv.org/abs/1805.09676
Autor:
Harshaw, Christopher R., Bridges, Robert A., Iannacone, Michael D., Reed, Joel W., Goodall, John R.
This paper introduces a novel graph-analytic approach for detecting anomalies in network flow data called GraphPrints. Building on foundational network-mining techniques, our method represents time slices of traffic as a graph, then counts graphlets
Externí odkaz:
http://arxiv.org/abs/1602.01130
In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce a
Externí odkaz:
http://arxiv.org/abs/1504.04317
Publikováno v:
In Graphics and Visual Computing June 2020 3