Chris S. Lee

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
  • Gregory Conti, Kulsoom Abdullah, Julian Grizzard, John Stasko, John A Copeland, Mustaque Ahamad +2 others
  • 2006
he massive amount of security data that network sensors and host-based applications generate can quickly overwhelm the operators charged with defending the network. Often, operators overlook important details, and it's difficult to gain a coherent picture of network health and security status by manually traversing textual logs, using command-line analysis(More)
  • 1