4.7 Article

A Survey of Visualization Systems for Network Security

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Software Engineering

A multi-phase network situational awareness cognitive task analysis

Robert F. Erbacher et al.

INFORMATION VISUALIZATION (2010)

Article Computer Science, Software Engineering

Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats

Florian Mansmann et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2007)

Proceedings Paper Computer Science, Artificial Intelligence

SpiralView: Towards security policies assessment through visual correlation of network resources with evolution of alarms

Enrico Bertini et al.

VAST: IEEE SYMPOSIUM ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY 2007, PROCEEDINGS (2007)

Article Computer Science, Software Engineering

Visualizing Internet routing changes

Mohit Lad et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2006)

Article Computer Science, Software Engineering

The perceptual scalability of visualization

Beth Yost et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2006)

Article Computer Science, Software Engineering

Balancing systematic and flexible exploration of social networks

Adam Perer et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2006)

Article Computer Science, Software Engineering

Visual correlation of network alerts

S Foresti et al.

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2006)

Article Computer Science, Software Engineering

Countering security information overload through alert and packet visualization

G Conti et al.

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2006)

Article Computer Science, Hardware & Architecture

A comprehensive approach to intrusion detection alert correlation

F Valeur et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2004)

Article Computer Science, Software Engineering

Intrusion and misuse detection in large-scale systems

RF Erbacher et al.

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2002)

Article Computer Science, Cybernetics

Mapping semantic information in virtual space: dimensions, variance and individual differences

SJ Westerman et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2000)

Article Computer Science, Hardware & Architecture

Anomaly-based intrusion detection: privacy concerns and other problems

E Lundin et al.

COMPUTER NETWORKS (2000)