Methods of visualizing temporal patterns in and mission impact of computer security breaches | IEEE Conference Publication | IEEE Xplore