메뉴 건너뛰기




Volumn , Issue , 2004, Pages 55-64

Home-centric visualization of network traffic for security administration

Author keywords

Information Visualization; Networks; Security

Indexed keywords

COMPUTER SOFTWARE; GRAPHICAL USER INTERFACES; NETWORK PROTOCOLS; PACKET NETWORKS; SECURITY OF DATA; SERVERS; TELECOMMUNICATION LINKS; TELECOMMUNICATION TRAFFIC;

EID: 20444447760     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029208.1029217     Document Type: Conference Paper
Times cited : (133)

References (23)
  • 9
    • 0033897901 scopus 로고    scopus 로고
    • Designing pixel-oriented visualization techniques: Theory and applications
    • D. A. Keim. Designing pixel-oriented visualization techniques: theory and applications. Visualization and Computer Graphics, IEEE Transactions on, 6(1):59-78, 2000.
    • (2000) Visualization and Computer Graphics, IEEE Transactions on , vol.6 , Issue.1 , pp. 59-78
    • Keim, D.A.1
  • 10
    • 0032257669 scopus 로고    scopus 로고
    • The gridfit algorithm: An efficient and effective approach to visualizing large amounts of spatial data
    • IEEE Visualization
    • D. A. Keim and A. Herrmann. The gridfit algorithm: An efficient and effective approach to visualizing large amounts of spatial data. In Proceedings of the Conference on Visualization '98, pages 181-188. IEEE Visualization, 1998.
    • (1998) Proceedings of the Conference on Visualization '98 , pp. 181-188
    • Keim, D.A.1    Herrmann, A.2
  • 11
    • 20444459915 scopus 로고    scopus 로고
    • Empirical comparison of dynamic query sliders and brushing histograms
    • IEEE Computer Society
    • Q. Li and C. North. Empirical comparison of dynamic query sliders and brushing histograms. In Proceedings of the IEEE Symposium on Information Visualization 2003. pages 147-153. IEEE Computer Society, 2003.
    • (2003) Proceedings of the IEEE Symposium on Information Visualization 2003 , pp. 147-153
    • Li, Q.1    North, C.2
  • 12
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 darpa off-line intrusion detection evaluation
    • October
    • R. Lippmann, J. Haines, D. J. Fried, J. Korba, and K. Das. The 1999 darpa off-line intrusion detection evaluation. Computer Networks, 34(4):579-595, October 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 14
    • 20444437991 scopus 로고    scopus 로고
    • Datawear: Revealing trends of dynamic data in visualizations
    • IEEE, IEEE computer Society, October
    • C. North, U. Farooq, and D. Akhter. Datawear: Revealing trends of dynamic data in visualizations. In LBHT Proc. IEEE Symposium on Info Vis 2001, pages 8-11. IEEE, IEEE computer Society, October 2001.
    • (2001) LBHT Proc. IEEE Symposium on Info Vis 2001 , pp. 8-11
    • North, C.1    Farooq, U.2    Akhter, D.3
  • 18
    • 0029725135 scopus 로고    scopus 로고
    • The eyes have it: A task by data type taxonomy for information visualizations
    • IEEE, IEEE Computer Society
    • B. Shneiderman. The eyes have it: A task by data type taxonomy for information visualizations. In Proceedings of the IEEE Symposium on Visual Languages '96, pages 336-343. IEEE, IEEE Computer Society, 1996.
    • (1996) Proceedings of the IEEE Symposium on Visual Languages '96 , pp. 336-343
    • Shneiderman, B.1
  • 20
    • 0242676079 scopus 로고    scopus 로고
    • A visual exploration process for the analysis of internet routing data
    • IEEE Computer Society
    • S. T. Teoh, K.-L. Ma, and S. F. Wu. A visual exploration process for the analysis of internet routing data. In Proceedings of the IEEE Conference on Visualization 2003, pages 523-530. IEEE Computer Society, 2003.
    • (2003) Proceedings of the IEEE Conference on Visualization 2003 , pp. 523-530
    • Teoh, S.T.1    Ma, K.-L.2    Wu, S.F.3
  • 21
    • 0027037672 scopus 로고
    • Distortions in cognitive maps
    • B. Tversky. Distortions in cognitive maps. Geoforum, 23(2):131-138, 1992.
    • (1992) Geoforum , vol.23 , Issue.2 , pp. 131-138
    • Tversky, B.1
  • 22
    • 0038819499 scopus 로고    scopus 로고
    • A taxonomy for information security technologies
    • May
    • H. Venter and J. Eloff. A taxonomy for information security technologies. Computers and Security, 22:299-307, May 2003.
    • (2003) Computers and Security , vol.22 , pp. 299-307
    • Venter, H.1    Eloff, J.2
  • 23
    • 0020735295 scopus 로고
    • Compatibility and resource competition between modalities of input, central processing, and output
    • C. Wickens, D. Sandry, and M. Vidulich. Compatibility and resource competition between modalities of input, central processing, and output. Human Factors, 25(2):227-248, 1983.
    • (1983) Human Factors , vol.25 , Issue.2 , pp. 227-248
    • Wickens, C.1    Sandry, D.2    Vidulich, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.