-
1
-
-
34547342508
-
BGPlay: A system, for visualizing the interdomain routing evolution
-
G. Di Battista, F. Mariani, M. Patrignani, and M. Pizzonia, "BGPlay: A System, for Visualizing the Interdomain Routing Evolution," Graph Drawing, 2003.
-
(2003)
Graph Drawing
-
-
Di Battista, G.1
Mariani, F.2
Patrignani, M.3
Pizzonia, M.4
-
5
-
-
33847243488
-
Analysis and visualization of network data using JUNG
-
to appear
-
J. Madaadhain, D. Fisher, P. Smyth, S. White, and Y.-B. Boey, "Analysis and Visualization of Network Data Using JUNG," J. Statistical Software, to appear.
-
J. Statistical Software
-
-
Madaadhain, J.1
Fisher, D.2
Smyth, P.3
White, S.4
Boey, Y.-B.5
-
7
-
-
0033204412
-
An analysis of BGP convergence properties
-
Aug.
-
T.G. Griffin and G.T. Wilfong, "An Analysis of BGP Convergence Properties," Proc. SIGCOMM, pp. 277-288, Aug. 1999.
-
(1999)
Proc. SIGCOMM
, pp. 277-288
-
-
Griffin, T.G.1
Wilfong, G.T.2
-
8
-
-
84859691149
-
-
Dec.
-
North Am. Network Operators Group (NANOG), http://www.nanog.org, Dec. 2005.
-
(2005)
-
-
-
10
-
-
13944272563
-
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP
-
S.T. Teoh, K. Zhang, S.-M. Tseng, K.-L. Ma, and S.F. Wu, "Combining Visual and Automated Data Mining for Near-Real-Time Anomaly Detection and Analysis in BGP," VizSEC/DMSEC '04: Proc. 2004 ACM Workshop Visualization and Data Mining for Computer Security, pp. 35-44, 2004.
-
(2004)
VizSEC/DMSEC '04: Proc. 2004 ACM Workshop Visualization and Data Mining for Computer Security
, pp. 35-44
-
-
Teoh, S.T.1
Zhang, K.2
Tseng, S.-M.3
Ma, K.-L.4
Wu, S.F.5
-
11
-
-
0036448607
-
Case study: Interactive visualization for internet security
-
S.T. Teoh and K.-L. Ma, "Case Study: Interactive Visualization for Internet Security," Proc. IEEE Visualization Conf., 2002.
-
(2002)
Proc. IEEE Visualization Conf.
-
-
Teoh, S.T.1
Ma, K.-L.2
-
13
-
-
0041710247
-
Visualization of the high level structure of the internet with hermes
-
A. Carmignani, G. Di Battista, W. Didimo, F. Matera, and M. Pizzonia, "Visualization of the High Level Structure of the Internet with Hermes," J. Graph Algorithms and Applications, pp. 281-311, 2002.
-
(2002)
J. Graph Algorithms and Applications
, pp. 281-311
-
-
Carmignani, A.1
Di Battista, G.2
Didimo, W.3
Matera, F.4
Pizzonia, M.5
-
14
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
R.F. Erbacher, K.L. Walker, and D.A. Frincke, "Intrusion and Misuse Detection in Large-Scale Systems," IEEE Computer Graphics and Applications, vol. 22, pp. 38-47, 2002.
-
(2002)
IEEE Computer Graphics and Applications
, vol.22
, pp. 38-47
-
-
Erbacher, R.F.1
Walker, K.L.2
Frincke, D.A.3
-
15
-
-
20444495766
-
PortVis: A tool, for port-based detection of security events
-
J. McPherson, K.-L. Ma, P. Krystosk, T. Bartoletti, and M. Christensen, "PortVis: A Tool, for Port-Based Detection of Security Events," VizSEC/DMSEC '04: Proc. 2004 ACM Workshop Visualization and Data Mining for Computer Security, 2004.
-
(2004)
VizSEC/DMSEC '04: Proc. 2004 ACM Workshop Visualization and Data Mining for Computer Security
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
16
-
-
15744369080
-
NVisionIP: An interactive network flow visualization tool for security
-
Oct.
-
K. Lakkaraju, W. Yurdk, R. Bearavolu, and A.J. Lee, "NVisionIP: An Interactive Network Flow Visualization Tool for Security," Proc. IEEE Int'l. Conf. Systems, Man, and Cybernetics, pp. 2675-2680, Oct. 2004.
-
(2004)
Proc. IEEE Int'l. Conf. Systems, Man, and Cybernetics
, pp. 2675-2680
-
-
Lakkaraju, K.1
Yurdk, W.2
Bearavolu, R.3
Lee, A.J.4
-
17
-
-
84870897584
-
Network intrusion visualization with NIVA, an intrusion visual analyzer with haptic integration
-
Mar.
-
K. Nyarko, T. Capers, C. Scott, and K. Ladeji-Osias, "Network Intrusion Visualization with NIVA, an Intrusion Visual Analyzer with Haptic Integration," Proc. 10th Symp. Haptic Interfaces for Virtual Environment and Teleoperator Systems (HAPTICS), pp. 277-284, Mar. 2002.
-
(2002)
Proc. 10th Symp. Haptic Interfaces for Virtual Environment and Teleoperator Systems (HAPTICS)
, pp. 277-284
-
-
Nyarko, K.1
Capers, T.2
Scott, C.3
Ladeji-Osias, K.4
-
18
-
-
13944256121
-
VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness
-
X. Yin, W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju, "VisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness," VizSEC/DMSEC '04: Proc. 2004 ACM Workshop Visualization and Data Mining for Computer Security, 2004.
-
(2004)
VizSEC/DMSEC '04: Proc. 2004 ACM Workshop Visualization and Data Mining for Computer Security
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
-
20
-
-
20444477572
-
A prototype tool for visual data mining of network traffic for intrusion detection
-
W. Yurcik, K. Lakkaraju, J. Barlow, and J. Rosendale, "A Prototype Tool for Visual Data Mining of Network Traffic for Intrusion Detection," Proc. ICDM Workshop Data Mining for Computer Security (DMSEC), 2003.
-
(2003)
Proc. ICDM Workshop Data Mining for Computer Security (DMSEC)
-
-
Yurcik, W.1
Lakkaraju, K.2
Barlow, J.3
Rosendale, J.4
-
22
-
-
11244285675
-
Locating internet routing instabilities
-
Sept.
-
A. FeldMann, O. Maennel, Z. Morley Mao, A. Berger, and B. Maggs, "Locating Internet Routing Instabilities," Proc. SIGCOMM, Sept. 2004.
-
(2004)
Proc. SIGCOMM
-
-
FeldMann, A.1
Maennel, O.2
Morley Mao, Z.3
Berger, A.4
Maggs, B.5
-
24
-
-
0030609301
-
Internet routing instability
-
C. Labovitz, G.R. Malan, and F. Jahanian, "Internet Routing Instability," Proc. ACM SIGCOMM '97, pp. 115-126, 1997.
-
(1997)
Proc. ACM SIGCOMM '97
, pp. 115-126
-
-
Labovitz, C.1
Malan, G.R.2
Jahanian, F.3
-
25
-
-
0141762464
-
Observation and analysis of BGP behavior under stress
-
L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior under Stress," Proc. ACM SIGCOMM Internet Measurement Workshop, 2002.
-
(2002)
Proc. ACM SIGCOMM Internet Measurement Workshop
-
-
Wang, L.1
Zhao, X.2
Pei, D.3
Bush, R.4
Massey, D.5
Mankin, A.6
Wu, S.7
Zhang, L.8
|