Login / Signup

Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks.

Keith S. JonesNatalie R. LodingerBenjamin P. WidlusAkbar Siami NaminEmily MawMiriam Armstrong
Published in: J. Multimodal User Interfaces (2022)
Keyphrases
  • cyber attacks
  • real time
  • countermeasures
  • cyber security
  • privacy issues
  • data mining
  • distributed systems
  • anomaly detection
  • intrusion detection
  • attack detection
  • cyber defense