메뉴 건너뛰기




Volumn , Issue , 2004, Pages 119-123

Scatter (and other) plots for visualizing user profiling data and network traffic

Author keywords

Visualization

Indexed keywords

COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; COMPUTER VISION; CORRELATION METHODS; GRAPH THEORY; MATRIX ALGEBRA; TEXT PROCESSING; VECTORS; VISUALIZATION; WORD PROCESSING;

EID: 20444505708     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1029208.1029227     Document Type: Conference Paper
Times cited : (20)

References (19)
  • 1
    • 84860950781 scopus 로고    scopus 로고
    • ftp://ftp.njit.edu/pub/manikopo/data.
  • 2
    • 84860950780 scopus 로고    scopus 로고
    • www.ll.mit.edu/IST/ideval/data/data_index.html.
  • 3
    • 20444481413 scopus 로고    scopus 로고
    • Joint work with m. s. postol
    • Joint work with m. s. postol.
  • 12
    • 0036472459 scopus 로고    scopus 로고
    • Anomaly detection in embedded systems
    • February
    • R. Maxion and K. Tan. Anomaly detection in embedded systems. IEEE Transactions on Computers, 51(2), February 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.2
    • Maxion, R.1    Tan, K.2
  • 18
    • 0036085540 scopus 로고    scopus 로고
    • Why 6? defining the operational limits of stide, an anomaly-based intrusion detector
    • Oakland, CA, May
    • K. Tan and R. Maxion. Why 6? defining the operational limits of stide, an anomaly-based intrusion detector. In IEEE Symposium on Security and Privacy. Oakland, CA, May 2002.
    • (2002) IEEE Symposium on Security and Privacy
    • Tan, K.1    Maxion, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.