Author of the publication

Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.

, , , and . J. Internet Serv. Inf. Secur., 4 (4): 127-137 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Force-Directed Parallel Coordinates., , , , , and . IV, page 36-44. IEEE Computer Society, (2013)Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection., , , and . J. Internet Serv. Inf. Secur., 4 (4): 127-137 (2014)Visualizing multiple error-sensitivity fields for single camera positioning., , , , , and . Computat. and Visualiz. in Science, 15 (6): 303-317 (2012)Glyph Visualization: A Fail-Safe Design Scheme Based on Quasi-Hamming Distances., , , and . IEEE Computer Graphics and Applications, 37 (2): 31-41 (2017)Glyph Sorting: Interactive Visualization for Multi-dimensional Data, , , , , , and . CoRR, (2013)MatchPad: Interactive Glyph-Based Visualization for Real-Time Sports Performance Analysis., , , , , , and . Comput. Graph. Forum, 31 (3): 1255-1264 (2012)A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches., , , , , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 270-281. Springer, (2014)Understanding Insider Threat: A Framework for Characterising Attacks., , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 214-228. IEEE Computer Society, (2014)Visual Analytics for Non-Expert Users in Cyber Situation Awareness.. IJCSA, 1 (1): 54-73 (2016)Glyph sorting: Interactive visualization for multi-dimensional data., , , , , , and . Information Visualization, 14 (1): 76-90 (2015)