Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1812.02867
Cited By
How do information security workers use host data? A summary of interviews with security analysts
7 December 2018
Robert A. Bridges
Michael D. Iannacone
J. Goodall
Justin M. Beaver
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"How do information security workers use host data? A summary of interviews with security analysts"
2 / 2 papers shown
Title
Forming IDEAS Interactive Data Exploration & Analysis System
Robert A. Bridges
Maria Vincent
Kelly M. T. Huffer
J. Goodall
Jessie D. Jamieson
Zachary Burch
23
4
0
24 May 2018
Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware
Qian Chen
Robert A. Bridges
44
199
0
25 Sep 2017
1