Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
DOI: 10.1109/discex.2001.932229
|View full text |Cite
|
Sign up to set email alerts
|

Methods of visualizing temporal patterns in and mission impact of computer security breaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Indeed, much of the research on SA in cybersecurity, or cyber-SA, has primarily taken an algorithmic perspective (Orlikowski & Iacono, 2001); focusing primarily on the automation and the development of new defensive tools for protection, detection and response . Examples of this work include data visualizations (D'Amico, A. & Larkin, 2001), data fusion methods for tracking cyber-attacks (Stotz & Sudit, 2007;Yang, Shanchieh J., Stotz, Holsopple, Sudit, & Kuhl, 2009), identification of internal and external threats using * Corresponding author e-mail: mjt241@smeal.psu.edu intelligent agents (Buford, Lewis, & Jakobson, 2008;Yen et al, 2010), and the use of probabilistic models to assess network vulnerability (Peng, Li, Xinming, Peng, & Levy, 2010;Tadda, G., Salerno, Boulware, Hinman, & Gorton, 2006).…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, much of the research on SA in cybersecurity, or cyber-SA, has primarily taken an algorithmic perspective (Orlikowski & Iacono, 2001); focusing primarily on the automation and the development of new defensive tools for protection, detection and response . Examples of this work include data visualizations (D'Amico, A. & Larkin, 2001), data fusion methods for tracking cyber-attacks (Stotz & Sudit, 2007;Yang, Shanchieh J., Stotz, Holsopple, Sudit, & Kuhl, 2009), identification of internal and external threats using * Corresponding author e-mail: mjt241@smeal.psu.edu intelligent agents (Buford, Lewis, & Jakobson, 2008;Yen et al, 2010), and the use of probabilistic models to assess network vulnerability (Peng, Li, Xinming, Peng, & Levy, 2010;Tadda, G., Salerno, Boulware, Hinman, & Gorton, 2006).…”
Section: Introductionmentioning
confidence: 99%