Follow
Richard Bejtlich
Richard Bejtlich
Founder, TaoSecurity
Verified email at taosecurity.com - Homepage
Title
Cited by
Cited by
Year
The Tao of Network Security Monitoring: Beyond Intrusion Detection
R Bejtlich
Pearson Education, 2004
3132004
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
R Bejtlich
No Starch Press, 2013
1922013
Real Digital Forensics: Computer Security and Incident Response
KJ Jones, R Bejtlich, CW Rose
Addison-Wesley Professional, 2005
1742005
Extrusion Detection: Security Monitoring for Internal Intrusions
R Bejtlich
Addison-Wesley Professional, 2005
772005
Network intrusion detection visualization
SC Evans, T Markham, R Bejtlich, J Impson, E Steinbrecher
US Patent 8,245,301, 2012
532012
Network attack visualization and response through intelligent icons
SC Evans, TS Markham, R Bejtlich, BG Barnett, BJ Scholz, RJ Mitchell, ...
US Patent 8,245,302, 2012
222012
El Tao de la monitorización de seguridad en redes: más allá de la detección de intrusiones
R Bejtlich
Pearson-Prentice Hall, 2005
142005
Strategic defence in cyberspace: beyond tools and tactics
R Bejtlich, K Geers, RA against Ukraine
Cyber War in Perspective: Russian Aggression against Ukraine. Kenneth Geers …, 2015
82015
Directions in incident detection and response
R Bejtlich, J Steven, G Peterson
IEEE Security & Privacy 9 (1), 91-92, 2011
52011
CIRT-level response to advanced persistent threat
R Bejtlich
SANS Forensics Incident Response Summit, 2010
52010
Integrating the Network Security Monitoring Model
R Bejtlich
Sysadmin Magazine. April, 2004
52004
Interpreting Network Traffic: A Network Intrusion Detector’s Look at Suspicious Events
R Bejtlich
Version, 2000
52000
Towards Zero-Day Attack Detection through Intelligent Icon Visualization of MDL Model Proximity
SC Evans, R Bejtlich, TS Markham, J Impson, E Steinbrecher
VizSec, 2008
32008
OpenPacket. org: the challenge of a free, public packet capture repository
R Bejtlich
Proceedings of the 1st ACM workshop on Network data anonymization, 1-2, 2008
22008
Military Privatization: A Framework for the 1990s and Beyond
RM Bejtlich, GP Hickman
JOHN F KENNEDY SCHOOL OF GOVERNMENT CAMBRIDGE MA, 1996
11996
The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship
R Bejtlich
2021
The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices
R Bejtlich
2020
The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent Threat
R Bejtlich
2020
The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice
R Bejtlich
2020
Network attack visualization and response through intelligent icons
SC Evans, TS Markham, R Bejtlich, B Barnett, B Scholz, R Mitchell, W Yan, ...
Military Communications Conference, 2009. MILCOM 2009. IEEE, 1-7, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20