-
1
-
-
15744365585
-
-
Mar.
-
Argus - metrics. Web Page, Mar. 2001. 〈http://www.qosient.com/argus/metrics.htm〉.
-
(2001)
Argus - Metrics. Web Page
-
-
-
2
-
-
3142657520
-
A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks
-
Ratna Bearavolu, Kiran Lakkaraju, William Yurcik, and Hrishikesh Raje. A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks. In IEEE Military Communications Conference (Milcom), 2003.
-
(2003)
IEEE Military Communications Conference (Milcom)
-
-
Bearavolu, R.1
Lakkaraju, K.2
Yurcik, W.3
Raje, H.4
-
3
-
-
24944574614
-
-
Jan. (Jun. 2004).
-
CERT/CC Statistics 1988-2003, Jan. 2004. 〈http://www.cert.org/stats/〉. (Jun. 2004).
-
(2004)
CERT/CC Statistics 1988-2003
-
-
-
5
-
-
3142735378
-
Security applications for cisco netflow data
-
SANS, Jul.
-
Jana Dunn. Security applications for cisco netflow data. Technical report, SANS, Jul. 2001. 〈http://www.sans.org/rr/papers/index.php?id=778〉.
-
(2001)
Technical Report
-
-
Dunn, J.1
-
7
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
Jan.-Feb.
-
Robert F. Erbacher, Kenneth L. Walker, and Deborah A. Frincke. Intrusion and misuse detection in large-scale systems. Computer Graphics and Applications, 22(1):38-48, Jan.-Feb. 2002.
-
(2002)
Computer Graphics and Applications
, vol.22
, Issue.1
, pp. 38-48
-
-
Erbacher, R.F.1
Walker, K.L.2
Frincke, D.A.3
-
9
-
-
20444435141
-
-
National Center for Supercomputing Applications, Apr.
-
NCSA Automated Learning Group. D2K Toolkit User Manual. National Center for Supercomputing Applications, Apr. 2003. 〈http://algdocs.ncsa.uiuc.edu/TU-20030425-1.pdf〉.
-
(2003)
D2K Toolkit User Manual
-
-
-
12
-
-
20444477556
-
Nvisionip - A traffic visualization tool for security analysis of large and complex networks
-
Kiran Lakkaraju, Ratna Bearavolu, and William Yurcik. Nvisionip - a traffic visualization tool for security analysis of large and complex networks. In International Multiconference on Measurement, Modelling, and Evaluation of Computer-Communications Systems (Performance TOOLS), 2003.
-
(2003)
International Multiconference on Measurement, Modelling, and Evaluation of Computer-Communications Systems (Performance TOOLS)
-
-
Lakkaraju, K.1
Bearavolu, R.2
Yurcik, W.3
-
13
-
-
15744369080
-
NVisionIP: An interactive network flow visualization tool for security
-
Kiran Lakkaraju, William Yurcik, Ratna Bearavolu, and Adam J. Lee. NVisionIP: An Interactive Network Flow Visualization Tool for Security. In IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2004.
-
(2004)
IEEE International Conference on Systems, Man, and Cybernetics (SMC)
-
-
Lakkaraju, K.1
Yurcik, W.2
Bearavolu, R.3
Lee, A.J.4
-
14
-
-
4243116400
-
The spinning cube of potential doom
-
Jun.
-
Stephen Lau. The spinning cube of potential doom. Communications of the ACM, 47(6):25-26, Jun. 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 25-26
-
-
Lau, S.1
-
15
-
-
85094839698
-
Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics
-
Dec.
-
John-Paul Navarro, Bill Nickless, and Linda Winkler. Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics. In 14th Systems Administration Conference (LISA 2000), Dec. 2000.
-
(2000)
14th Systems Administration Conference (LISA 2000)
-
-
Navarro, J.-P.1
Nickless, B.2
Winkler, L.3
-
18
-
-
85077741011
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
Adam G. Pennington, John D. Strunk, John Linwood, Griffin, Craig A.N. Soules, Garth R. Goodson, and Gregory R. Ganger. Storage-based intrusion detection: Watching storage activity for suspicious behavior. In USENIX Security Symposium 2003, 2003. 〈http://www.pdl.cmu.edu/PDL-FTP/Secure/usenix03.pdf〉.
-
(2003)
USENIX Security Symposium 2003
-
-
Pennington, A.G.1
Strunk, J.D.2
Linwood, J.3
Griffin4
Soules, C.A.N.5
Goodson, G.R.6
Ganger, G.R.7
-
21
-
-
84976715951
-
Tree visualization with tree-maps: 2-d space-filling approach
-
Ben Shneiderman. Tree visualization with tree-maps: 2-d space-filling approach. ACM Trans. Graph., 11(1):92-99, 1992.
-
(1992)
ACM Trans. Graph.
, vol.11
, Issue.1
, pp. 92-99
-
-
Shneiderman, B.1
-
22
-
-
20444450595
-
-
Jun.
-
Security incident fusion toolkit SIFT, Jun.
-
-
-
Sift, S.I.F.T.1
-
25
-
-
84860940569
-
-
Jun.
-
Security threat manager. Web Page, Jun. 2004. 〈http://www.open.com/products/threatmanager/threatmanager. shtml%〉.
-
(2004)
Security Threat Manager. Web Page
-
-
-
27
-
-
0004192137
-
-
Graphics Press, P.O. Box 430, Cheshire, CT 06410, Second edition, Jan.
-
Edward R. Tufte. The Visual Display of Quantitative Information. Graphics Press, P.O. Box 430, Cheshire, CT 06410, Second edition, Jan. 2001.
-
(2001)
The Visual Display of Quantitative Information
-
-
Tufte, E.R.1
-
28
-
-
84860952433
-
-
May
-
United States Department of Homeland Security. Team Coordination Training, Student Guide, May 2004. 〈http://www.cgaux.info/g_ocx/training/tct/〉.
-
(2004)
Team Coordination Training, Student Guide
-
-
-
29
-
-
2442480533
-
Visflowconnect: Providing security situational awareness by visualizing network traffic flows
-
Xiaoxin Yin, William Yurcik, Yifan Li, Kiran Lakkaraju, and Cristina Abad. Visflowconnect: Providing security situational awareness by visualizing network traffic flows. In Workshop on Information Assurance (WIA04) held in conjunction with the 23rd IEEE International Performance Computing and Communications Conference (IPCCC), 2004.
-
(2004)
Workshop on Information Assurance (WIA04) Held in Conjunction with the 23rd IEEE International Performance Computing and Communications Conference (IPCCC)
-
-
Yin, X.1
Yurcik, W.2
Li, Y.3
Lakkaraju, K.4
Abad, C.5
|