Network graph anomaly analysis and security visualization

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Original languageEnglish
Title of host publicationNetwork graph anomaly analysis and security visualization
PublisherIn AFCEA Command, Control, Communications, Cyber and Intelligence (C4I) Technology Review Days and Exposition, Utica, NY
StatePublished - Jun 2014

Fingerprint

Dive into the research topics of 'Network graph anomaly analysis and security visualization'. Together they form a unique fingerprint.

Cite this