Login / Signup
Heuristics for evaluating IT security management tools.
Pooya Jaferian
Kirstie Hawkey
Andreas Sotirakopoulos
Konstantin Beznosov
Published in:
CHI Extended Abstracts (2011)
Keyphrases
</>
management tools
web applications
information security
intrusion detection
metadata
knowledge management
end users
data management
semantic web technologies
project management
data mining
artificial intelligence