-
2
-
-
1142267334
-
Gigascope: A stream database for network applications
-
C. Cranor, T. Johnson, O. Spataschek, and V. Shkapenyuk. Gigascope: a stream database for network applications. Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pages 647-651, 2003.
-
(2003)
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
, pp. 647-651
-
-
Cranor, C.1
Johnson, T.2
Spataschek, O.3
Shkapenyuk, V.4
-
3
-
-
84867453337
-
Graphviz-Open Source Graph Drawing Tools
-
J. Ellson, E. Gansner, L. Koutsofios, S. North, and G. Woodhull. Graphviz-Open Source Graph Drawing Tools. Lecture Notes in Computer Science, pages 483-484, 2002.
-
(2002)
Lecture Notes in Computer Science
, pp. 483-484
-
-
Ellson, J.1
Gansner, E.2
Koutsofios, L.3
North, S.4
Woodhull, G.5
-
4
-
-
33645213060
-
Visual correlation of network alerts
-
S. Foresti, J. Agutter, Y. Livnat, and S. Moon. Visual correlation of network alerts. IEEE Computer Graphics and Applications, 26(2):48-59, 2006.
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
, pp. 48-59
-
-
Foresti, S.1
Agutter, J.2
Livnat, Y.3
Moon, S.4
-
5
-
-
33749532337
-
Preserving the Big Picture: Visual Network Trafffic Analysis with TNV
-
Washington, DC, USA, IEEE Computer Society
-
J. R. Goodall, W. G. Lutters, P. Rheingans, and A. Komlodi. Preserving the Big Picture: Visual Network Trafffic Analysis with TNV. In VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
7
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In USENIX Security Symposium, pages 139-154, 2008.
-
(2008)
USENIX Security Symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
8
-
-
85169449380
-
-
J. Heer, S. Card, and J. Landay. prefuse: a toolkit for interactive information visualization. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 421-430. ACM New York, NY, USA, 2005.
-
J. Heer, S. Card, and J. Landay. prefuse: a toolkit for interactive information visualization. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 421-430. ACM New York, NY, USA, 2005.
-
-
-
-
9
-
-
33845640864
-
Hierarchical Edge Bundles: Visualization of Adjacency Relations in Hierarchical Data
-
D. Holten. Hierarchical Edge Bundles: Visualization of Adjacency Relations in Hierarchical Data. IEEE Trans. Vis. Comput. Graph., 12(5):741-748, 2006.
-
(2006)
IEEE Trans. Vis. Comput. Graph
, vol.12
, Issue.5
, pp. 741-748
-
-
Holten, D.1
-
10
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. C. Freiling. Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm. In LEET, 2008.
-
(2008)
LEET
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.C.5
-
11
-
-
0006513005
-
Otter: A general-purpose network visualization tool
-
B. Huffaker, E. Nemeth, and K. Claffy. Otter: A general-purpose network visualization tool. In Proc. INET 99, 1999.
-
(1999)
Proc. INET
, vol.99
-
-
Huffaker, B.1
Nemeth, E.2
Claffy, K.3
-
12
-
-
33749537123
-
Visualizing cyber attacks using IP matrix
-
K. Ohno, editor
-
H. Koike, H. Koike, K. Ohno, and K. Koizumi. Visualizing cyber attacks using IP matrix. In K. Ohno, editor, Proc. IEEE Workshop on Visualization for Computer Security (VizSEC 05), pages 91-98, 2005.
-
(2005)
Proc. IEEE Workshop on Visualization for Computer Security (VizSEC 05)
, pp. 91-98
-
-
Koike, H.1
Koike, H.2
Ohno, K.3
Koizumi, K.4
-
13
-
-
33749527089
-
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations
-
26 Oct
-
K. Lakkaraju, R. Bearavolu, A. Slagell, W. Yurcik, and S. North. Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. In Visualization for Computer Security, IEEE Workshops on, pages 9-9, 26 Oct. 2005.
-
(2005)
Visualization for Computer Security, IEEE Workshops on
, pp. 9-9
-
-
Lakkaraju, K.1
Bearavolu, R.2
Slagell, A.3
Yurcik, W.4
North, S.5
-
14
-
-
56449085285
-
Visualizing large-scale IP traffic flows
-
November, Saarbrücken, Germany
-
F. Mansmann, F. Fischer, D. A. Keim, and S. C. North. Visualizing large-scale IP traffic flows. In Proceedings of 12th International Workshop Vision, Modeling, and Visualization, November 2007. Saarbrücken, Germany.
-
(2007)
Proceedings of 12th International Workshop Vision, Modeling, and Visualization
-
-
Mansmann, F.1
Fischer, F.2
Keim, D.A.3
North, S.C.4
-
15
-
-
35948957403
-
Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats
-
F. Mansmann, D. Keim, S. North, B. Rexroad, and D. Sheleheda. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. IEEE Trans. Vis. Comput. Graph., pages 1105-1112, 2007.
-
(2007)
IEEE Trans. Vis. Comput. Graph
, pp. 1105-1112
-
-
Mansmann, F.1
Keim, D.2
North, S.3
Rexroad, B.4
Sheleheda, D.5
-
16
-
-
74049109854
-
-
NfSen - Netow Sensor. A graphical web based front end for the nfdump netow tools, 2007. http://nfsen.sourceforge.net/.
-
NfSen - Netow Sensor. A graphical web based front end for the nfdump netow tools, 2007. http://nfsen.sourceforge.net/.
-
-
-
-
18
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
T. Peng, C. Leckie, and K. Ramamohanarao. Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Comput. Surv., 39(1):3, 2007.
-
(2007)
ACM Comput. Surv
, vol.39
, Issue.1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
19
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In Internet Measurement Conference, pages 41-52, 2006.
-
(2006)
Internet Measurement Conference
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
20
-
-
74049154917
-
-
N. Robison and J. Scaparra. Interactive network active-traffic visualization. Technical report, Texas A&M University, 2007. http: //inav.scaparra.com/docs/whitePapers/INAV.pdf.
-
N. Robison and J. Scaparra. Interactive network active-traffic visualization. Technical report, Texas A&M University, 2007. http: //inav.scaparra.com/docs/whitePapers/INAV.pdf.
-
-
-
-
21
-
-
84976715951
-
Tree visualization with tree-maps: 2-d space-filling approach
-
B. Shneiderman. Tree visualization with tree-maps: 2-d space-filling approach. ACM Trans. Graph., 11(1):92-99, 1992.
-
(1992)
ACM Trans. Graph
, vol.11
, Issue.1
, pp. 92-99
-
-
Shneiderman, B.1
|