Cloudbreak: Answering the Challenges of Cyber Command and Control
暂无分享,去创建一个
[1] Kevin M. Carter,et al. Probabilistic reasoning for streaming anomaly detection , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).
[2] Frank Maurer,et al. Agile Methods and User-Centered Design: How These Two Methodologies are Being Successfully Integrated in Industry , 2008, Agile 2008 Conference.
[3] Robert K. Cunningham,et al. Detecting and displaying novel computer attacks with Macroscope , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[4] Frank Maurer,et al. UCD in agile projects: dream team or odd couple? , 2005, INTR.
[5] Jason Koepke,et al. Operational data classes for establishing situational awareness in cyberspace , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).
[6] Michael Silver,et al. Defense Management: Perspectives on the Involvement of the Combatant Commands in the Development of Joint Requirements , 2011 .
[7] Lane Harrison,et al. Visualization evaluation for cyber security: trends and future directions , 2014, VizSEC.
[8] Desirée Sy,et al. Adapting usability investigations for agile user-centered design , 2007 .
[9] Diane Staheli,et al. Unlocking user-centered design methods for building cyber security visualizations , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).
[10] Richard Lippmann,et al. EMBER: a global perspective on extreme malicious behavior , 2010, VizSec '10.