-
1
-
-
7744228219
-
Presentation of real-time communication network measurement information
-
D. J. Parish, A. Pagonis, D. Barnet, J. M. Sandford and I. W. Phillips, "Presentation of real-time communication network measurement information," in IEE Proceedings. Science, Measurement and Technology, 2004, pp. 319-326.
-
(2004)
IEE Proceedings. Science, Measurement and Technology
, pp. 319-326
-
-
Parish, D.J.1
Pagonis, A.2
Barnet, D.3
Sandford, J.M.4
Phillips, I.W.5
-
2
-
-
0003488008
-
-
San Francisco, CA: Morgan Kaufmann
-
S. K. Card, J. D. Mackinlay and B. Sheiderman, Readings in Information Visualisation: Using Vision to Think. San Francisco, CA: Morgan Kaufmann, 1999, pp. 686.
-
(1999)
Readings in Information Visualisation: Using Vision to Think
, pp. 686
-
-
Card, S.K.1
Mackinlay, J.D.2
Sheiderman, B.3
-
3
-
-
33745460819
-
-
K. Abdullah, C. Lee, G. Conti and J. A. Copeland, "Visualizing network data for intrusion detection," in 2005, pp. 100-108.
-
(2005)
Visualizing network data for intrusion detection
, pp. 100-108
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
-
8
-
-
4243116400
-
The Spinning Cube of Potential Doom
-
S. Lau, "The Spinning Cube of Potential Doom," Commun ACM, vol. 47, pp. 25-26, 2004.
-
(2004)
Commun ACM
, vol.47
, pp. 25-26
-
-
Lau, S.1
-
9
-
-
84870897584
-
-
K. Nyarko, T. Capers, C. Scott and K. Ladeji-Osias, "Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration," in 2002, pp. 277-284.
-
(2002)
Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration
, pp. 277-284
-
-
Nyarko, K.1
Capers, T.2
Scott, C.3
Ladeji-Osias, K.4
-
10
-
-
33749520207
-
-
K. Abdullah, C. P. Lee, G. Conti, J. A. Copeland and J. Stasko, IDS Rainstorm: Visualizing IDS alarms, in Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on 2005, pp. 1-10.
-
K. Abdullah, C. P. Lee, G. Conti, J. A. Copeland and J. Stasko, "IDS Rainstorm: Visualizing IDS alarms," in Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on 2005, pp. 1-10.
-
-
-
-
11
-
-
35348891443
-
-
13 April, logs. Available
-
J. Chartier. (2005, 13 April). SnortALog : Snort analyser logs. Available: http://jeremy.chartier.free.fr/snortalog/index.html# sample
-
(2005)
SnortALog : Snort analyser
-
-
Chartier, J.1
-
15
-
-
33749533756
-
A user-centered look at glyph-based security visualization
-
A. Komlodi, P. Rheingans, Utkarsha Ayachit, J. R. Goodall and Amit Joshi, "A user-centered look at glyph-based security visualization," in Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on, 2005, pp. 21-28.
-
(2005)
Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on
, pp. 21-28
-
-
Komlodi, A.1
Rheingans, P.2
Ayachit, U.3
Goodall, J.R.4
Joshi, A.5
-
16
-
-
33749517393
-
Information assurance visualizations for specific stages of situational awareness and intended uses: Lessons learned
-
A. Dapos Amico and M. Kocka, "Information assurance visualizations for specific stages of situational awareness and intended uses: Lessons learned," in Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on, 2005, pp. 107-112.
-
(2005)
Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on
, pp. 107-112
-
-
Dapos Amico, A.1
Kocka, M.2
-
17
-
-
30644478743
-
-
G. Tedesco and U. Aickelin. (2006), Data reduction in intrusion alert correlation. WSEAS Transactions on Computers pp. 186-193. Available: http://eprints.nottingham.ac.uk/archive/00000365/
-
G. Tedesco and U. Aickelin. (2006), Data reduction in intrusion alert correlation. WSEAS Transactions on Computers pp. 186-193. Available: http://eprints.nottingham.ac.uk/archive/00000365/
-
-
-
-
18
-
-
35348878547
-
-
MaxMind LLC, MaxMind, GeoIP, 2006, 26 May 2006. 2006.
-
MaxMind LLC, "MaxMind, GeoIP," vol. 2006, 26 May 2006. 2006.
-
-
-
-
19
-
-
33847395411
-
Time series modeling for IDS alert management
-
J. Viinikka, H. Debar, L. Me and R. Seguier, "Time series modeling for IDS alert management," in ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006, pp. 102-113.
-
(2006)
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 102-113
-
-
Viinikka, J.1
Debar, H.2
Me, L.3
Seguier, R.4
-
20
-
-
35348858101
-
-
MIT Lincoln Laboratory. DARPA intrusion detection evaluation, pp. Last Date Accessed: 05/09/2005. Available: http://www.ll.mit.edu/IST/ideval/data/ data_index.html
-
MIT Lincoln Laboratory. DARPA intrusion detection evaluation, pp. Last Date Accessed: 05/09/2005. Available: http://www.ll.mit.edu/IST/ideval/data/ data_index.html
-
-
-
-
21
-
-
35348880918
-
-
IANA. (2006, 12-Mar-2006). Internet assigned numbers authority. [Online]. 2006(26-Jun-2006), pp. 1. Available: http://www.iana.org/assignments/protocol- numbers
-
IANA. (2006, 12-Mar-2006). Internet assigned numbers authority. [Online]. 2006(26-Jun-2006), pp. 1. Available: http://www.iana.org/assignments/protocol- numbers
-
-
-
|