메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 58-63

Closing-the-loop: Discovery and search in security visualizations

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK LOGS; SECURITY ENGINEERS; SECURITY VISUALIZATION TOOLS; SECURITY VISUALIZATIONS;

EID: 33745467523     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2005.1495934     Document Type: Conference Paper
Times cited : (9)

References (10)
  • 4
    • 0036448607 scopus 로고    scopus 로고
    • Case study: Interactive visualization for internet security
    • S. T. Teoh, K.-L. Ma, S. F. Wu, and X. Zhao, "Case study: Interactive visualization for internet security," in IEEE Visualization, 2002.
    • (2002) IEEE Visualization
    • Teoh, S.T.1    Ma, K.-L.2    Wu, S.F.3    Zhao, X.4
  • 5
    • 4243116400 scopus 로고    scopus 로고
    • The spinning cube of potential doom
    • S. Lau, "The spinning cube of potential doom," Communications of the ACM, vol 47(6), pp. 25-26, 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 25-26
    • Lau, S.1
  • 6
    • 84858906554 scopus 로고    scopus 로고
    • www.snort.org.
  • 10
    • 84858888730 scopus 로고    scopus 로고
    • "Argus web site." http://www.qosient.com/argus/index.htm.
    • Argus Web Site


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.