際際滷shows by User: MikeFisk / http://www.slideshare.net/images/logo.gif 際際滷shows by User: MikeFisk / Mon, 28 Nov 2016 00:18:52 GMT 際際滷Share feed for 際際滷shows by User: MikeFisk Cyber Analytics Applications for Data-Intensive Computing /slideshow/cyber-analytics-applications-for-dataintensive-computing/69576792 c6u76mgbqwigaq0welz3-signature-e1c7edb7a7e1846bebd09b3a9bcdd936876d781dc7c6672f958033e3a33df4ba-poli-161128001852
2010 presentation at Salishan]]>

2010 presentation at Salishan]]>
Mon, 28 Nov 2016 00:18:52 GMT /slideshow/cyber-analytics-applications-for-dataintensive-computing/69576792 MikeFisk@slideshare.net(MikeFisk) Cyber Analytics Applications for Data-Intensive Computing MikeFisk 2010 presentation at Salishan <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/c6u76mgbqwigaq0welz3-signature-e1c7edb7a7e1846bebd09b3a9bcdd936876d781dc7c6672f958033e3a33df4ba-poli-161128001852-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2010 presentation at Salishan
Cyber Analytics Applications for Data-Intensive Computing from Mike Fisk
]]>
229 2 https://cdn.slidesharecdn.com/ss_thumbnails/c6u76mgbqwigaq0welz3-signature-e1c7edb7a7e1846bebd09b3a9bcdd936876d781dc7c6672f958033e3a33df4ba-poli-161128001852-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Real-time Change Detection & Automatic Network Response /slideshow/realtime-change-detection-automatic-network-response/69576571 brughrealtimechangedetection-161128000118
This 2009 presentation describes 5 years of experience with automatic response to cyber security threats detected on the network using anomalous change detection.]]>

This 2009 presentation describes 5 years of experience with automatic response to cyber security threats detected on the network using anomalous change detection.]]>
Mon, 28 Nov 2016 00:01:18 GMT /slideshow/realtime-change-detection-automatic-network-response/69576571 MikeFisk@slideshare.net(MikeFisk) Real-time Change Detection & Automatic Network Response MikeFisk This 2009 presentation describes 5 years of experience with automatic response to cyber security threats detected on the network using anomalous change detection. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/brughrealtimechangedetection-161128000118-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This 2009 presentation describes 5 years of experience with automatic response to cyber security threats detected on the network using anomalous change detection.
Real-time Change Detection & Automatic Network Response from Mike Fisk
]]>
235 3 https://cdn.slidesharecdn.com/ss_thumbnails/brughrealtimechangedetection-161128000118-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NNSA CIO Bob Osborn Introduces the CSL at ISRCS 2012 /slideshow/nnsa-cio-bob-osborn-introduces-the-csl-at-isrcs-2012/15974462 keynoteosborn-130113110146-phpapp02
]]>

]]>
Sun, 13 Jan 2013 11:01:46 GMT /slideshow/nnsa-cio-bob-osborn-introduces-the-csl-at-isrcs-2012/15974462 MikeFisk@slideshare.net(MikeFisk) NNSA CIO Bob Osborn Introduces the CSL at ISRCS 2012 MikeFisk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/keynoteosborn-130113110146-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
NNSA CIO Bob Osborn Introduces the CSL at ISRCS 2012 from Mike Fisk
]]>
563 4 https://cdn.slidesharecdn.com/ss_thumbnails/keynoteosborn-130113110146-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-MikeFisk-48x48.jpg?cb=1523634007 scholar.google.com/citations?user=4ynNtvkAAAAJ https://cdn.slidesharecdn.com/ss_thumbnails/c6u76mgbqwigaq0welz3-signature-e1c7edb7a7e1846bebd09b3a9bcdd936876d781dc7c6672f958033e3a33df4ba-poli-161128001852-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyber-analytics-applications-for-dataintensive-computing/69576792 Cyber Analytics Applic... https://cdn.slidesharecdn.com/ss_thumbnails/brughrealtimechangedetection-161128000118-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/realtime-change-detection-automatic-network-response/69576571 Real-time Change Detec... https://cdn.slidesharecdn.com/ss_thumbnails/keynoteosborn-130113110146-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/nnsa-cio-bob-osborn-introduces-the-csl-at-isrcs-2012/15974462 NNSA CIO Bob Osborn In...