-
6
-
-
84870897584
-
Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration
-
March 24 - 25. Orlando, Florida
-
Nyarko, K; Capers, T; Scott, C and Ladeji-Osias, K. Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration. 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems. March 24 - 25, 2002. Orlando, Florida, p. 277.
-
(2002)
10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems
, pp. 277
-
-
Nyarko, K.1
Capers, T.2
Scott, C.3
Ladeji-Osias, K.4
-
7
-
-
84858895189
-
-
last accessed March 2005
-
The Spinning Cube of Potential Doom. http://www.nersc.gov/nusers/ security/TheSpinningCube.php, last accessed March 2005.
-
The Spinning Cube of Potential Doom
-
-
-
10
-
-
20444438039
-
Passive visual fingerprinting of network attack tools
-
Washington, D.C., October
-
Conti, G. and Abdullah, K. Passive Visual Fingerprinting of Network Attack Tools. ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC), pp. 45-54, Washington, D.C., October 2004.
-
(2004)
ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC)
, pp. 45-54
-
-
Conti, G.1
Abdullah, K.2
-
11
-
-
13944256121
-
VisFIowConnect: NetFlow visualizations of link relationships for security situational awareness
-
Washington, D.C., October
-
X. Yin, W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju, VisFIowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness. ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC), pp. 26-34, Washington, D.C., October 2004.
-
(2004)
ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC)
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
-
12
-
-
46449131083
-
-
National Center for Advanced Secure Systems Research Group last accessed April 2004
-
Security Incident Fusion Tool, National Center for Advanced Secure Systems Research Group. http://www.ncassr.org/projects/sift/papers/, last accessed April 2004.
-
Security Incident Fusion Tool
-
-
-
13
-
-
84858903814
-
-
last accessed December
-
EtherApe: A Graphical Network Monitor, http://etherape.sourceforge.net/, last accessed December 2004.
-
(2004)
A Graphical Network Monitor
-
-
-
16
-
-
84898404219
-
Network eye: End-to-end computer security visualization
-
Submitted for consideration
-
Fink, G.; Ball, R; Jawalkar, N.; North, C. and Correa, R. Network Eye: End-to-End Computer Security Visualization. Submitted for consideration at ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSec/DMSec) 2004.
-
ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSec/DMSec) 2004
-
-
Fink, G.1
Ball, R.2
Jawalkar, N.3
North, C.4
Correa, R.5
-
18
-
-
84858898061
-
-
last accessed December 2004
-
TCPDump Public Repository, http://www.tcpdump.org/, last accessed December 2004.
-
-
-
-
19
-
-
77951527890
-
-
last accessed December 2004
-
Ethereal: A Network Protocol Analyzer, http://www.ethereal.com/, last accessed December 2004.
-
A Network Protocol Analyzer
-
-
-
20
-
-
84858891067
-
-
Lancope Corporation, last accessed April 2004
-
Stealth Watch + Therminator. Lancope Corporation. http://www. stealthwatch.com/, last accessed April 2004.
-
Stealth Watch + Therminator
-
-
-
21
-
-
84858901303
-
-
Honeynet Security Console
-
Activeworx.org, Honeynet Security Console, http://www.activeworx.org/ programs/hsc/index.htm.
-
-
-
-
24
-
-
84858898062
-
-
NETI@home, last accessed February 2005
-
NETI@home, http://neti.gatech.edu/, last accessed February 2005.
-
-
-
|