Putting Security in Context : Visual Correlation of Network Activity with Real-World. Pike, A, W., Scherrer, C., & Zabriskie, S. bibtex @article{ Pike,
author = {Pike, W A and Scherrer, C and Zabriskie, S},
pages = {203--220},
title = {{Putting Security in Context : Visual Correlation of Network Activity with Real-World}}
}
Downloads: 0
{"_id":{"_str":"535ed25a97e559e8210004a7"},"__v":0,"authorIDs":[],"author_short":["Pike","A, W.","Scherrer, C.","Zabriskie, S."],"bibbaseid":"pike-a-scherrer-zabriskie-puttingsecurityincontextvisualcorrelationofnetworkactivitywithrealworld","bibdata":{"downloads":0,"bibbaseid":"pike-a-scherrer-zabriskie-puttingsecurityincontextvisualcorrelationofnetworkactivitywithrealworld","urls":{},"role":"author","type":"article","title":"Putting Security in Context : Visual Correlation of Network Activity with Real-World","pages":"203--220","key":"Pike","id":"Pike","bibtype":"article","bibtex":"@article{ Pike,\n author = {Pike, W A and Scherrer, C and Zabriskie, S},\n pages = {203--220},\n title = {{Putting Security in Context : Visual Correlation of Network Activity with Real-World}}\n}","author_short":["Pike","A, W.","Scherrer, C.","Zabriskie, S."],"author":["Pike","A, W","Scherrer, C","Zabriskie, S"]},"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/14215034/bibs/bibs/A-List-bb.bib","downloads":0,"keywords":[],"search_terms":["putting","security","context","visual","correlation","network","activity","real","world","pike","a","scherrer","zabriskie"],"title":"Putting Security in Context : Visual Correlation of Network Activity with Real-World","year":null,"dataSources":["jGrSs2aYARmRcupKy"]}