- 1 Kidd, A. The marks are on the knowledge worker. In Proceedings of CHI'94 Human Factors in Computing Systems (ACM Press, New York), 1994, pp. 186-191. Google ScholarDigital Library
- 2 Malone, T. How do people organize their desktops? Implications for the design of office systems. ACM Transactions on Office Information Systems 1 (1983), pp. 99-112. Google ScholarDigital Library
- 3 Whittaker, S., Davies, R., Hirschberg, J., and Muller, U. Jotmail: a voicemail interface that enables you to see what was said. In Proceedings of CHI2000 Conference on Human Computer Interaction (2000), pp. 89-96. Google ScholarDigital Library
- 4 Whittaker, S. and Sidner, C. E-mail overload: exploring personal management of e-mail. In Proceedings of CHI96 Conference on Computer Human Interaction (ACM Press, New York), 1996, pp. 276-283. Google ScholarDigital Library
Index Terms
- Research alerts: the character, value, and management of personal paper archives
Recommendations
Techniques and tools for analyzing intrusion alerts
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts be ...
Situational assessment of intrusion alerts: a multi attack scenario evaluation
ICICS'11: Proceedings of the 13th international conference on Information and communications securityIn this research study, we focus on intrusion alerts and the burden of analyzing numerous security events by network administrators. We present Avisa2, a network security visualization system that can assist in the comprehension of IDS alerts and ...
Comments