-
1
-
-
0036448607
-
Case study: Interactive visualization for Internet security
-
Teoh, S; Ma, K; Wu, F and Zhao, X. Case Study: Interactive Visualization for Internet Security, Proceedings of IEEE Information Visualization, 2002.
-
(2002)
Proceedings of IEEE Information Visualization
-
-
Teoh, S.1
Ma, K.2
Wu, F.3
Zhao, X.4
-
3
-
-
84860948260
-
Graphical presentation of stepping-stone pairs found
-
last accessed April 2004
-
Teoh, S. Graphical Presentation of Stepping-Stone Pairs Found. Initial Results, http://graphics.cs.ucdavis.edu/~steoh/research/tcpdump/tcpdump.html, last accessed April 2004.
-
Initial Results
-
-
Teoh, S.1
-
4
-
-
46449131083
-
-
National Center for Advanced Secure Systems Research Group. accessed April 2004
-
Security Incident Fusion Tool, National Center for Advanced Secure Systems Research Group. http://www.ncassr.org/projects/sift/papers/, last accessed April 2004.
-
Security Incident Fusion Tool
-
-
-
6
-
-
0004347333
-
-
last accessed April 2004
-
An Atlas of Cyberspaces. http://www.cybergeography.org/atlas/atlas.html, last accessed April 2004.
-
An Atlas of Cyberspaces
-
-
-
10
-
-
20444451706
-
Intrusion detection and visualization using perl
-
San Diego, California, U.S.A., 23rd - 29th of July
-
Juslin, J. Intrusion Detection and Visualization Using Perl. O'Reilly Open Source Conference 2001, San Diego, California, U.S.A., 23rd - 29th of July 2001.
-
(2001)
O'Reilly Open Source Conference 2001
-
-
Juslin, J.1
-
13
-
-
84870897584
-
Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration
-
March 24 - 25. Orlando, Florida
-
Nyarko, K; Capers, T; Scott, C and Ladeji-Osias, K. Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration. 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems. March 24 - 25, 2002. Orlando, Florida, p. 277.
-
(2002)
10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems
, pp. 277
-
-
Nyarko, K.1
Capers, T.2
Scott, C.3
Ladeji-Osias, K.4
-
14
-
-
84860950640
-
Information visualization for intrusion detection
-
last accessed April 2004
-
Goodall, J. Information Visualization for Intrusion Detection. The Intrusion Detection Tool Kit (IDtk). http://userpages.umbc.edu/~jgood/idtk.php, last accessed April 2004.
-
The Intrusion Detection Tool Kit (IDtk)
-
-
Goodall, J.1
-
15
-
-
84860948717
-
-
last accessed April 2004
-
SecureScope. Secure Decisions. http://www.securedecisions.com/, last accessed April 2004.
-
SecureScope. Secure Decisions
-
-
-
16
-
-
84860951636
-
StealthWatch + Therminator
-
last accessed April 2004
-
StealthWatch + Therminator. Lancope Corporation. http://www.stealthwatch.com/, last accessed April 2004.
-
Lancope Corporation
-
-
-
19
-
-
84860946236
-
-
last accessed April 2004
-
NetStumbler Homepage, http://www.netstumbler.com/, last accessed April 2004.
-
NetStumbler Homepage
-
-
-
20
-
-
84860942137
-
-
last accessed April 2004
-
3D Traceroute Homepage, http://www.hlembke.de/prod/3dtraceroute/, last accessed April 2004.
-
3D Traceroute Homepage
-
-
-
21
-
-
84860947025
-
-
last accessed April 2004
-
The Xtraceroute Homepage. http://www.dtek.chalmers.se/~d3august/xt/, last accessed April 2004.
-
The Xtraceroute Homepage
-
-
-
22
-
-
84860951193
-
-
last accessed March
-
Fydor, "Top 75 Network Security Tools," http://www.insecure.org/tools.html, last accessed March 2004.
-
(2004)
Top 75 Network Security Tools
-
-
Fydor1
-
23
-
-
84877061311
-
-
last accessed March 2004
-
TCPDUMP Public Repository, http://www.tcpdump.org/, last accessed March 2004.
-
TCPDUMP Public Repository
-
-
-
24
-
-
84860941962
-
-
last accessed March 2004
-
Snort Project Page, http://www.snort.org/, last accessed March 2004.
-
Snort Project Page
-
-
-
25
-
-
84870405833
-
-
last acccessed April 2004
-
The Honeynet Project, http://project.honeynet.org/, last acccessed April 2004.
-
The Honeynet Project
-
-
-
26
-
-
0004145058
-
-
Secure Networks, Inc. January, last accessed April 2004
-
Ptacek, T and Newsham, T. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Secure Networks, Inc. January, 1998. http://www.insecure.org/stf/secnet_ids/secnet_ids.html, last accessed April 2004.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.1
Newsham, T.2
-
32
-
-
28444464348
-
The plane with parallel coordinates
-
Inselberg, A. The Plane with Parallel Coordinates, The Visual Computer, 1, pp. 100-107.
-
The Visual Computer
, vol.1
, pp. 100-107
-
-
Inselberg, A.1
-
33
-
-
84950434348
-
Hyperdimensional data analysis using parallel coordinates
-
Wegman, E. Hyperdimensional Data Analysis Using Parallel Coordinates. Journal of the American Statistical Association, 85:411, pp. 664-675.
-
Journal of the American Statistical Association
, vol.85
, Issue.411
, pp. 664-675
-
-
Wegman, E.1
-
35
-
-
0026944030
-
Seesoft - A tool for visualizing line oriented software statistics
-
November
-
Eick, S; Steffen, J and Sumner, E. Seesoft - A Tool for Visualizing Line Oriented Software Statistics. IEEE Transactions on Software Engineering, 18, 11, November 1992, pp. 957-968.
-
(1992)
IEEE Transactions on Software Engineering
, vol.18
, Issue.11
, pp. 957-968
-
-
Eick, S.1
Steffen, J.2
Sumner, E.3
|