Information assurance: a cyber security storm map
暂无分享,去创建一个
[1] Chase Qishi Wu,et al. Monitoring security events using integrated correlation-based techniques , 2009, CSIIRW '09.
[2] John C. McCarthy,et al. Technology as experience , 2004, INTR.
[3] Dipankar Dasgupta,et al. Consequences of Diminishing Trust in Cyberspace , 2013, Int. J. Cyber Warf. Terror..
[4] Chase Qishi Wu,et al. A Cyber-Security Storm MAP , 2012, 2012 International Conference on Cyber Security.
[5] Brenda Dervin,et al. Sense-making theory and practice: an overview of user interests in knowledge seeking and use , 1998, J. Knowl. Manag..
[6] Chase Qishi Wu,et al. An integrated cyber security monitoring system using correlation-based techniques , 2009, 2009 IEEE International Conference on System of Systems Engineering (SoSE).
[7] Gilbert Cockton. Revisiting usability's three key principles , 2008, CHI Extended Abstracts.
[8] Chase Qishi Wu,et al. Visualization of security events using an efficient correlation technique , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[9] Colin Ware,et al. Information Visualization: Perception for Design , 2000 .
[10] Christine E. Wania,et al. How do design and evaluation interrelate in HCI research? , 2006, DIS '06.