-
2
-
-
85008014396
-
A patch in nine saves time?
-
June
-
W. Arbaugh, "A patch in nine saves time?," Computer, pp. 82-83, June 2004.
-
(2004)
Computer
, pp. 82-83
-
-
Arbaugh, W.1
-
4
-
-
3242768505
-
Issues in high-speed internet security
-
July
-
P. Jungck and S. S. Y. Shim, "Issues in high-speed internet security," Computer, vol. 37, pp. 36-42, July 2004.
-
(2004)
Computer
, vol.37
, pp. 36-42
-
-
Jungck, P.1
Shim, S.S.Y.2
-
7
-
-
33745473920
-
-
Last updated April 3
-
"Tcpdump/libpcap." Last updated April 3, 2004.
-
(2004)
Tcpdump/libpcap
-
-
-
8
-
-
84946398426
-
The use of honeynets to detect exploited systems across large enterprise networks
-
IEEE Systems, Man and Cybernetics Society, (West Point, NY), June
-
J. Levine, R. LaBella, H. Owen, D. Contis, and B. Culver, "The use of honeynets to detect exploited systems across large enterprise networks," in Proceedings of the IEEE Workshop on Information Assurance, IEEE Systems, Man and Cybernetics Society, (West Point, NY), pp. 92-99, June 2003.
-
(2003)
Proceedings of the IEEE Workshop on Information Assurance
, pp. 92-99
-
-
Levine, J.1
Labella, R.2
Owen, H.3
Contis, D.4
Culver, B.5
-
9
-
-
0029272732
-
Visualizing network data
-
March
-
R. Becker, S. Eick, and A. Wilks, "Visualizing network data," IEEE Transactions on Visualization and Computer Graphics, vol. 1, pp. 16-28, March 1995.
-
(1995)
IEEE Transactions on Visualization and Computer Graphics
, vol.1
, pp. 16-28
-
-
Becker, R.1
Eick, S.2
Wilks, A.3
-
10
-
-
0029477046
-
Case study: 3d displays of internet traffic
-
IEEE Computer Society, Oct.
-
K. Cox and S. Eick, "Case study: 3d displays of internet traffic," in Proceedings of Information Visualization (INFOVIS), IEEE Computer Society, pp. 129-131, Oct. 1995.
-
(1995)
Proceedings of Information Visualization (INFOVIS)
, pp. 129-131
-
-
Cox, K.1
Eick, S.2
-
11
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
January/February
-
R. Erbacher, K. Walker, and D. Frincke, "Intrusion and misuse detection in large-scale systems," Computer Graphics and Applications, vol. 22, pp. 38-48, January/February 2002.
-
(2002)
Computer Graphics and Applications
, vol.22
, pp. 38-48
-
-
Erbacher, R.1
Walker, K.2
Frincke, D.3
-
12
-
-
84870897584
-
Network intrusion visualization with niva: An intrusion detection visual analyzer with haptic integration
-
March
-
K. Nyarko, T. Capers, C. Scott, and K. Ladeji-Osias, "Network intrusion visualization with niva: an intrusion detection visual analyzer with haptic integration," in 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems (HAPTICS '02), pp. 277-284, March 2002.
-
(2002)
10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems (HAPTICS '02)
, pp. 277-284
-
-
Nyarko, K.1
Capers, T.2
Scott, C.3
Ladeji-Osias, K.4
-
13
-
-
2442480533
-
Visflowconnect: Providing security situational awareness by visualizing network traffic flows
-
held in conjunction with the 23rd IEEE International Performance Computing and Communications Conference (IPCCC 2004)
-
X. Yin, W. Yurcik, Y. Li, K. Lakkaraju, and C. Abad, " Visflowconnect: Providing security situational awareness by visualizing network traffic flows," in Proceedings on the Workshop on Information Assurance (WIA04), 2004. held in conjunction with the 23rd IEEE International Performance Computing and Communications Conference (IPCCC 2004).
-
(2004)
Proceedings on the Workshop on Information Assurance (WIA04)
-
-
Yin, X.1
Yurcik, W.2
Li, Y.3
Lakkaraju, K.4
Abad, C.5
-
14
-
-
0005238253
-
Flodar: Flow visualization of network traffic, IEEE computer graphics and applications
-
Sept.-Oct.
-
E. Swing, "Flodar: Flow visualization of network traffic," IEEE Computer Graphics and Applications, vol. 18, pp. 6-8, Sept.-Oct. 1998.
-
(1998)
Vol. 18
, pp. 6-8
-
-
Swing, E.1
-
16
-
-
84858903654
-
-
Lancope
-
"Stealthwatch+therminator." Lancope, 2004. http://www.lancope. com/.
-
(2004)
Stealthwatch+therminator
-
-
-
17
-
-
11144289352
-
Application of thermodynamics to the reduction of data generated by a non-standard system
-
Department of Physics Naval Postgraduate School, Montetey, CA., Feb.
-
D. Ford, "Application of thermodynamics to the reduction of data generated by a non-standard system," tech. rep., Department of Physics Naval Postgraduate School, Montetey, CA., Feb. 2004. Available at http://www.arxiv.org/abs/cond-mat/0402325.
-
(2004)
Tech. Rep.
-
-
Ford, D.1
-
19
-
-
20444477572
-
A prototype tool for visual data mining of network traffic for intrusion detection
-
W. Yurcik, K. Lakkaraju, J. Barlow, and J. Rosendale, "A prototype tool for visual data mining of network traffic for intrusion detection," in 3rd IEEE International Conference on Data Mining (ICDM) Workshop on Data Mining for Computer Security (DMSEC), 2003.
-
(2003)
3rd IEEE International Conference on Data Mining (ICDM) Workshop on Data Mining for Computer Security (DMSEC)
-
-
Yurcik, W.1
Lakkaraju, K.2
Barlow, J.3
Rosendale, J.4
-
21
-
-
0036648744
-
Hierarchical pixel bar charts
-
July-Sept.
-
D. Keim, M. Hao, and U. Dayal, "Hierarchical pixel bar charts," IEEE Transactions on Visualization and Computer Graphics, vol. 8, pp. 255-269, July-Sept. 2002.
-
(2002)
IEEE Transactions on Visualization and Computer Graphics
, vol.8
, pp. 255-269
-
-
Keim, D.1
Hao, M.2
Dayal, U.3
-
23
-
-
84858898347
-
10 most probed ports
-
June
-
"10 most probed ports." Distributed Intrusion Detection System, June 2004. http://www.dshield.org/topports.php.
-
(2004)
Distributed Intrusion Detection System
-
-
-
24
-
-
33745469440
-
-
Internet Assigned Numbers Authority. Last updated 28 May
-
"Port numbers." Internet Assigned Numbers Authority. Last updated 28 May 2004.
-
(2004)
Port Numbers
-
-
|