ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1812.02867
  4. Cited By
How do information security workers use host data? A summary of
  interviews with security analysts

How do information security workers use host data? A summary of interviews with security analysts

7 December 2018
Robert A. Bridges
Michael D. Iannacone
J. Goodall
Justin M. Beaver
ArXiv (abs)PDFHTML

Papers citing "How do information security workers use host data? A summary of interviews with security analysts"

2 / 2 papers shown
Title
Forming IDEAS Interactive Data Exploration & Analysis System
Forming IDEAS Interactive Data Exploration & Analysis System
Robert A. Bridges
Maria Vincent
Kelly M. T. Huffer
J. Goodall
Jessie D. Jamieson
Zachary Burch
25
4
0
24 May 2018
Automated Behavioral Analysis of Malware A Case Study of WannaCry
  Ransomware
Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware
Qian Chen
Robert A. Bridges
46
199
0
25 Sep 2017
1