ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Visual Security Analytics
Encyclopedia of Cryptography, Security and Privacy
◽
10.1007/978-3-642-27739-9_1674-1
◽
2021
◽
pp. 1-3
Author(s):
Fabian Böhm
Keyword(s):
Security Analytics
◽
Visual Security
Download Full-text
Related Documents
Cited By
References
A Survey on Cyber Security Analytics
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v6i11.649652
◽
2018
◽
Vol 6
(11)
◽
pp. 649-652
Author(s):
Nerella Sameera
◽
M. Shashi
Keyword(s):
Cyber Security
◽
Security Analytics
Download Full-text
On the use of security analytics for attack detection in vehicular ad hoc networks
2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)
◽
10.1109/ssic.2015.7245674
◽
2015
◽
Cited By ~ 3
Author(s):
Dhavy Gantsou
Keyword(s):
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Hoc Networks
◽
Security Analytics
Download Full-text
A formalism for visual security protocol modeling
Journal of Visual Languages & Computing
◽
10.1016/j.jvlc.2006.10.006
◽
2008
◽
Vol 19
(2)
◽
pp. 153-181
◽
Cited By ~ 1
Author(s):
J. McDermott
◽
G. Allwein
Keyword(s):
Security Protocol
◽
Visual Security
Download Full-text
A Review of Graph Approaches to Network Security Analytics
Lecture Notes in Computer Science - From Database to Cyber Security
◽
10.1007/978-3-030-04834-1_16
◽
2018
◽
pp. 300-323
Author(s):
Steven Noel
Keyword(s):
Network Security
◽
Security Analytics
Download Full-text
HPCC Systems for Cyber Security Analytics
Big Data Technologies and Applications
◽
10.1007/978-3-319-44550-2_12
◽
2016
◽
pp. 331-339
◽
Cited By ~ 1
Author(s):
Flavio Villanustre
◽
Mauricio Renzi
Keyword(s):
Cyber Security
◽
Security Analytics
◽
Hpcc Systems
Download Full-text
Gratings of constantly varying depth for visual security devices
Optical Engineering
◽
10.1117/1.602064
◽
1999
◽
Vol 38
(1)
◽
pp. 89
◽
Cited By ~ 4
Author(s):
Rene´ Staub
Keyword(s):
Visual Security
Download Full-text
Health Care Security Analytics
Data Analytics
◽
10.1201/9780429446177-16
◽
2018
◽
pp. 403-416
Author(s):
Mohiuddin Ahmed
◽
Abu Saleh Shah Mohammad Barkat Ullah
Keyword(s):
Health Care
◽
Security Analytics
Download Full-text
A Framework for Security Analytics of WBAN/WLAN Healthcare Network
2018 IEEE International Conference on Technology Management, Operations and Decisions (ICTMOD)
◽
10.1109/itmc.2018.8691294
◽
2018
◽
Author(s):
Boukri Khalil
◽
Najib Naja
Keyword(s):
Healthcare Network
◽
Security Analytics
Download Full-text
Automating Feature Extraction and Feature Selection in Big Data Security Analytics
Artificial Intelligence and Soft Computing - Lecture Notes in Computer Science
◽
10.1007/978-3-319-91262-2_38
◽
2018
◽
pp. 423-432
Author(s):
Dimitrios Sisiaridis
◽
Olivier Markowitch
Keyword(s):
Feature Extraction
◽
Feature Selection
◽
Big Data
◽
Data Security
◽
Security Analytics
Download Full-text
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics
2018 1st International Conference on Data Intelligence and Security (ICDIS)
◽
10.1109/icdis.2018.00014
◽
2018
◽
Cited By ~ 2
Author(s):
Dimitrios Sisiaridis
◽
Olivier Markowitch
Keyword(s):
Feature Extraction
◽
Feature Selection
◽
Big Data
◽
Data Security
◽
Data Complexity
◽
Selection For
◽
Security Analytics
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close