메뉴 건너뛰기




Volumn 4841 LNCS, Issue PART 1, 2007, Pages 564-575

A scalable aural-visual environment for security event monitoring, analysis, and response

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; DATA STRUCTURES; SCALABILITY; SECURITY OF DATA;

EID: 38149004399     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76858-6_55     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 1
    • 33749520207 scopus 로고    scopus 로고
    • IDS RainStorm: Visualizing IDS Alarms
    • on Visualization for Computer Security October
    • Abdullah, K., Lee, C., Conti, G., Copeland, J., Stasko, J.: IDS RainStorm: Visualizing IDS Alarms. In: IEEE Wkshp. on Visualization for Computer Security (October 2005)
    • (2005) IEEE Wkshp
    • Abdullah, K.1    Lee, C.2    Conti, G.3    Copeland, J.4    Stasko, J.5
  • 3
    • 20444438039 scopus 로고    scopus 로고
    • Passive Visual Fingerprinting of Network Attack Tools
    • on Visualization and Data Mining for Computer Security October
    • Conti, G., Abdullah, K.: Passive Visual Fingerprinting of Network Attack Tools. In: ACM Wkshp. on Visualization and Data Mining for Computer Security (October 2004)
    • (2004) ACM Wkshp
    • Conti, G.1    Abdullah, K.2
  • 4
    • 33645218144 scopus 로고    scopus 로고
    • Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries
    • on Visualization for Computer Security October
    • Conti, G., Grizzard, J., Ahamad, M., Owen, H.: Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. In: IEEE Wkshp. on Visualization for Computer Security (October 2005)
    • (2005) IEEE Wkshp
    • Conti, G.1    Grizzard, J.2    Ahamad, M.3    Owen, H.4
  • 7
    • 0034274870 scopus 로고    scopus 로고
    • An Open Graph Visualization System and Its Applications to Software Engineering
    • August
    • Gansner, E.R., North, S.C.: An Open Graph Visualization System and Its Applications to Software Engineering. Software: Practice and Experience 30(11) (August 2000)
    • (2000) Software: Practice and Experience , vol.30 , Issue.11
    • Gansner, E.R.1    North, S.C.2
  • 10
  • 12
    • 33749522392 scopus 로고    scopus 로고
    • Visual Firewall: Real-time Network Security Monitor
    • on Visualization for Computer Security October
    • Lee, C., Trost, J., Gibbs, N., Beyah, R., Copeland, J.A.: Visual Firewall: Real-time Network Security Monitor. In: IEEE Wkshp. on Visualization for Computer Security (October 2005)
    • (2005) IEEE Wkshp
    • Lee, C.1    Trost, J.2    Gibbs, N.3    Beyah, R.4    Copeland, J.A.5
  • 13
    • 38149100531 scopus 로고    scopus 로고
    • Libpcap format, wiki.wireshark.org/Development/LibpcapFileFormat
    • Libpcap format, wiki.wireshark.org/Development/LibpcapFileFormat
  • 14
    • 38149116447 scopus 로고    scopus 로고
    • Perl and the Tk Extension
    • Lidie, S.: Perl and the Tk Extension. The Perl Journal 1(1) (1996)
    • (1996) The Perl Journal , vol.1 , Issue.1
    • Lidie, S.1
  • 15
    • 20444486258 scopus 로고    scopus 로고
    • CyberSeer: 3D Audio-Visual Immersion for Network Security and Management
    • on Visualization and Data Mining for Computer Security October
    • Papadopoulos, C., Kyriakakis, C., Sawchuk, A., He, X.: CyberSeer: 3D Audio-Visual Immersion for Network Security and Management. In: ACM Wkshp. on Visualization and Data Mining for Computer Security (October 2004)
    • (2004) ACM Wkshp
    • Papadopoulos, C.1    Kyriakakis, C.2    Sawchuk, A.3    He, X.4
  • 16
    • 38149141831 scopus 로고    scopus 로고
    • Sandstrom, TA., Henze, C., Levit, C.: The Hyperwall. In: 1st Intl. Conf. on Coordinated and Multiple Views in Exploratory Visualization (2003)
    • Sandstrom, TA., Henze, C., Levit, C.: The Hyperwall. In: 1st Intl. Conf. on Coordinated and Multiple Views in Exploratory Visualization (2003)
  • 19
    • 84904883732 scopus 로고    scopus 로고
    • Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme
    • Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme. In: 10th IEEE Intl. Conf. on Network Protocols (November 2002)
    • (2002) 10th IEEE Intl. Conf. on Network Protocols (November
    • Xu, J.1    Fan, J.2    Ammar, M.H.3    Moon, S.B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.