-
2
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
ACM Press, New York
-
BALL, R., FINK, G.A., NORTH, C. 2004. Home-centric visualization of network traffic for security administration. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, ACM Press, New York. 55-64.
-
(2004)
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 55-64
-
-
BALL, R.1
FINK, G.A.2
NORTH, C.3
-
3
-
-
34247186609
-
-
BRO. 2005. Bro NIDS, http://www.bro-ids.org (03/06/2005).
-
BRO. 2005. Bro NIDS, http://www.bro-ids.org (03/06/2005).
-
-
-
-
4
-
-
34247214196
-
-
CERT/CC - CERT® COORDINATION CENTER. 2005. Carnegie Mellon Software Engineering Institute. Carnegie Mellon University. http://www.cert.org/ (27/05/2005).
-
CERT/CC - CERT® COORDINATION CENTER. 2005. Carnegie Mellon Software Engineering Institute. Carnegie Mellon University. http://www.cert.org/ (27/05/2005).
-
-
-
-
5
-
-
34247228333
-
-
CLARK, D. 2005. Scanmap3D-2.1b and Scanmap3D-3.0. Open source Snort visualization tool. http://scanmap3d.sourceforge.net/ (29/05/2005).
-
CLARK, D. 2005. Scanmap3D-2.1b and Scanmap3D-3.0. Open source Snort visualization tool. http://scanmap3d.sourceforge.net/ (29/05/2005).
-
-
-
-
6
-
-
34247189351
-
-
ETHEREAL. 2005. Packet capture and textual review tool http://www.ethereal.com/ (07/11/2005).
-
ETHEREAL. 2005. Packet capture and textual review tool http://www.ethereal.com/ (07/11/2005).
-
-
-
-
7
-
-
34247182839
-
-
FISK, M., SMITH, S.A., WEBER, P.M., KOTHAPALLY, S., CAUDELL, T.P. 2003. Immersive Network Monitoring. PAM2003 - Passive and Active Measurement 2003, NLANR/MNA (National Laboratory for Applied Network Research / Measurement and Network Analysis Group). http://public.lanl.gov/mfisk/papers/pam03.pdf (25/05/2005).
-
FISK, M., SMITH, S.A., WEBER, P.M., KOTHAPALLY, S., CAUDELL, T.P. 2003. Immersive Network Monitoring. PAM2003 - Passive and Active Measurement 2003, NLANR/MNA (National Laboratory for Applied Network Research / Measurement and Network Analysis Group). http://public.lanl.gov/mfisk/papers/pam03.pdf (25/05/2005).
-
-
-
-
8
-
-
4243116400
-
-
LAU, S. 2004. The Spinning Cube of Potential Doom. In Communications of the ACM archive, 47, Issue 6, ACM Press, New York. 25-26.
-
LAU, S. 2004. The Spinning Cube of Potential Doom. In Communications of the ACM archive, Volume 47, Issue 6, ACM Press, New York. 25-26.
-
-
-
-
9
-
-
34247201268
-
-
LAU, S. 2003. The Spinning Cube of Potential Doom. Online article, November 10th, 2003. National Energy Research Scientific Computing Center (NERSC) website: http://www.nersc.gov/nusers/security/TheSpinningCube.php (18/09/2005).
-
LAU, S. 2003. The Spinning Cube of Potential Doom. Online article, November 10th, 2003. National Energy Research Scientific Computing Center (NERSC) website: http://www.nersc.gov/nusers/security/TheSpinningCube.php (18/09/2005).
-
-
-
-
10
-
-
34247249967
-
-
NMAP. 2005. NMap network scanning utility. http://www.insecure. org/nmap/ (07/11/2005).
-
NMAP. 2005. NMap network scanning utility. http://www.insecure. org/nmap/ (07/11/2005).
-
-
-
-
11
-
-
34247256997
-
-
SNORT. 2005. Snort network intrusion prevention and detection system, http://www.snort.org/ (12/11/2005).
-
SNORT. 2005. Snort network intrusion prevention and detection system, http://www.snort.org/ (12/11/2005).
-
-
-
-
12
-
-
34247274376
-
-
TCPDUMP. 2005. TCPDump packet capture utility and LibPCap packet capture library, http://www.tcpdump.org (06/11/2005).
-
TCPDUMP. 2005. TCPDump packet capture utility and LibPCap packet capture library, http://www.tcpdump.org (06/11/2005).
-
-
-
-
13
-
-
4644354461
-
Detecting Flaws and Intruders with Visual Data Analysis
-
TEOH, S.T., MA, K-L., WU, S.F., JANKUN-KELLY, D.T.J. 2004. Detecting Flaws and Intruders with Visual Data Analysis. In IEEE Computer Graphics and Applications, Volume 24, Issue 5.
-
(2004)
IEEE Computer Graphics and Applications
, vol.24
, Issue.5
-
-
TEOH, S.T.1
MA, K.-L.2
WU, S.F.3
JANKUN-KELLY, D.T.J.4
-
14
-
-
34247203388
-
-
TURNER, D. (EXEC. ED.), ENTWISE, S. (ED.), ET AL (SYMANTEC). 2005. Symantec Internet Security Threat Report, Trends for July 04 - December 04, VIII, March 2005. http://enterprisesecurity.symantec.com/content.cfm?articleid= 1539 (20/04/2005).
-
TURNER, D. (EXEC. ED.), ENTWISE, S. (ED.), ET AL (SYMANTEC). 2005. Symantec Internet Security Threat Report, Trends for July 04 - December 04, Volume VIII, March 2005. http://enterprisesecurity.symantec.com/content.cfm?articleid= 1539 (20/04/2005).
-
-
-
-
15
-
-
13944256121
-
VisFlowConnect: Netflow visualizations of link relationships for security situational awareness
-
ACM Press, New York
-
YIN, X., YURCIK, W., TREASTER, M., LI, Y., LAKKARAJU, K. 2004. VisFlowConnect: netflow visualizations of link relationships for security situational awareness. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, ACM Press, New York. 35-44.
-
(2004)
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 35-44
-
-
YIN, X.1
YURCIK, W.2
TREASTER, M.3
LI, Y.4
LAKKARAJU, K.5
|