Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Renee E Etoty"'
Publikováno v:
HotSoS
As cyber-attacks become more sophisticated, cyber-attack analysts are required to process large amounts of network data and to reason under uncertainty with the aim of detecting cyber-attacks. Capturing and studying the fine-grained analysts' cogniti
Publikováno v:
CogSIMA
Efficiency and interference shielding are critical factors for conducting successful cognitive task analysis (CTA) of cyber-attack analysis. To achieve this goal, a tool, named ARSCA, is developed to work with an analyst during a cyber-attack analysi
Autor:
Robert F. Erbacher, Renee E Etoty
It was about 1992 when the Internet first became publically available on the World Wide Web domain via Netscape (http://education.illinois.edu/wp/commercialism/history-of-the-internet.htm) and today has become our main way of life s dealings and inte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9fb1022c76a0eda2aa1d618424937141
https://doi.org/10.21236/ada602127
https://doi.org/10.21236/ada602127
Autor:
Renee E Etoty, Robert F. Erbacher
Security visualization remains relatively an immature term. The idea of security visualization is the need for novel techniques that are fine-tuned for aiding cyber security analysts in distinguishing benign and malicious data. Intrusion Detection Sy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fad60be3efb217e4c24bea81118313b4
https://doi.org/10.21236/ada601590
https://doi.org/10.21236/ada601590
In response to chaotic nature of network traffic, making it very difficult to differentiate normal from malicious traffic, we have designed a user study that tests the effectiveness and usefulness of tabular versus graphical displays on such data. Th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a6dca4580caf948b5f3ac6e862307d7d
https://doi.org/10.21236/ada601647
https://doi.org/10.21236/ada601647
Autor:
Robert F. Erbacher, Hasan Cam, Deepak Samuel, William Glodek, John Yen, Renee E Etoty, Peng Liu, Steve Hutchinson, Chen Zhong
Publikováno v:
CogSIMA
In cyber analysis, it is highly desirable to support the analysis of junior analysts by leveraging the experiences of experts. But, there are two major challenges to achieve this goal. First, it is very costly to capture the experience of experts for