A survey of network anomaly visualization
Network anomaly analysis is an emerging subtopic of network security. Network anomaly
refers to the unusual behavior of network devices or suspicious network status. A number of …
refers to the unusual behavior of network devices or suspicious network status. A number of …
Opportunities and challenges for human-machine teaming in cybersecurity operations
C Lyn Paul, LM Blaha, CK Fallon… - Proceedings of the …, 2019 - journals.sagepub.com
Many of the challenges associated with cybersecurity operations are also ripe opportunities
for the application of human-machine teaming. Advances in cognitive science, artificial …
for the application of human-machine teaming. Advances in cognitive science, artificial …
Methods and systems for improving analytics in distributed networks
CY Shieh, TWF Chou - US Patent 10,193,929, 2019 - Google Patents
Systems and methods for improving analytics in a distrib uted network are described herein.
An example system includes at least one processor, an analytics module, and a security …
An example system includes at least one processor, an analytics module, and a security …
Deception using distributed threat detection
CY Shieh, M Woolward, Z Liu, CL Hou… - US Patent …, 2018 - Google Patents
Methods and systems for deception using distributed threat detection are provided.
Exemplary methods by an enforcement point, the enforcement point communicatively …
Exemplary methods by an enforcement point, the enforcement point communicatively …
Netcapvis: Web-based progressive visual analytics for network packet captures
Network traffic log data is a key data source for forensic analysis of cybersecurity incidents.
Packet Captures (PCAPs) are the raw information directly gathered from the network device …
Packet Captures (PCAPs) are the raw information directly gathered from the network device …
Visual firewall log analysis-at the border between analytical and appealing
M Schufrin, H Lücke-Tieke… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
In this paper, we present our design study on develo** an interactive visual firewall log
analysis system in collaboration with an IT service provider. We describe the human …
analysis system in collaboration with an IT service provider. We describe the human …
Understanding the context of network traffic alerts
BCM Cappers, JJ van Wijk - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
For the protection of critical infrastructures against complex virus attacks, automated network
traffic analysis and deep packet inspection are unavoidable. However, even with the use of …
traffic analysis and deep packet inspection are unavoidable. However, even with the use of …
Conditional declarative policies
JJ Lian, A Paterra, M Woolward - US Patent 10,333,986, 2019 - Google Patents
Methods, systems, and media for producing a firewall rule set are provided herein.
Exemplary methods may include receiving a declarative policy associated with a computer …
Exemplary methods may include receiving a declarative policy associated with a computer …
Anomaly detection in the HVAC system operation by a RadViz based visualization-driven approach
E Novikova, M Bestuzhev, I Kotenko - … 27, 2019 Revised Selected Papers 5, 2020 - Springer
The appearance of the smart houses, buildings, and cities has defined new attack scenarios
targeting industrial information systems. The paper suggests a visualization-driven approach …
targeting industrial information systems. The paper suggests a visualization-driven approach …
Evaluating visualization approaches to detect abnormal activities in network traffic data
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …
of the most significant research topics in network security. Various computational methods …