![Anomaly detection / Computer security / Computing / Anomaly / Botnet / Information technology management / Physics / Network Behavior Anomaly Detection / Data mining / Data security / Computer network security Anomaly detection / Computer security / Computing / Anomaly / Botnet / Information technology management / Physics / Network Behavior Anomaly Detection / Data mining / Data security / Computer network security](https://www.pdfsearch.io/img/aad23071b5d70dba1ff0b29e1e71015b.jpg)
| Document Date: 2009-01-21 12:09:36 Open Document File Size: 585,03 KBShare Result on Facebook
Company Microsoft / CounterStorm Inc. / / Country Columbia / / / IndustryTerm real-time correlation / disruptive technology / incumbent solutions / healthcare / finance / / NaturalFeature East coast / / OperatingSystem Unix / / Organization Department of Defense / Two Department / Department of Homeland Security SBIR / / Person Greg Shannon / / Position Chief Scientist / / Region East coast / / Technology P2P / HTTP / IPv6 / disruptive technology / Plug and play / / URL http /
SocialTag |