메뉴 건너뛰기




Volumn 6, Issue 1, 2010, Pages 1-29

Applied parallel coordinates for logs and network traffic attack analysis

Author keywords

Computer security; Data mining; Logs; Parallel coordinates; Visualization

Indexed keywords

ABNORMAL BEHAVIOR; ALERT SYSTEMS; ATTACK ANALYSIS; COMPUTER SECURITY; CONVERGENCE BEHAVIORS; DATA CORRELATIONS; DESCRIPTION LANGUAGES; ITS ARCHITECTURE; LINE PATTERN; LOGS; MATHEMATICAL THEORY; NETWORK TRAFFIC; PARALLEL COORDINATES;

EID: 74849112056     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-009-0127-3     Document Type: Article
Times cited : (14)

References (11)
  • 4
    • 84943817322 scopus 로고
    • Error detecting and error correcting codes
    • Hamming R.: Error detecting and error correcting codes. Bell Syst. Tech. J. 29, 147-160 (1950).
    • (1950) Bell Syst. Tech. J. , vol.29 , pp. 147-160
    • Hamming, R.1
  • 8
    • 0013592372 scopus 로고
    • Parallel coordinates for visualizing multi-dimensional geometry
    • Springer, New York, NY, USA
    • Inselberg, A., Dimsdale, B.: Parallel coordinates for visualizing multi-dimensional geometry. In: CG International '87 on Computer Graphics 1987, pp. 25-44. Springer, New York, NY, USA (1987).
    • (1987) CG International '87 on Computer Graphics 1987 , pp. 25-44
    • Inselberg, A.1    Dimsdale, B.2
  • 9
    • 0028419955 scopus 로고
    • Multidimensional lines ii: Proximity and applications
    • Inselberg A., Dimsdale B.: Multidimensional lines ii: proximity and applications. SIAM J. Appl. Math. 54(2), 578-596 (1994).
    • (1994) SIAM J. Appl. Math. , vol.54 , Issue.2 , pp. 578-596
    • Inselberg, A.1    Dimsdale, B.2
  • 10
    • 25144437707 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Levenshtein, V. I.: Binary codes capable of correcting deletions, insertions, and reversals. Tech. Rep. 8 (1966).
    • (1966) Tech. Rep. , pp. 8
    • Levenshtein, V.I.1
  • 11
    • 3142552643 scopus 로고    scopus 로고
    • A key recovery attack on the 802.11b wired equivalent privacy protocol (wep)
    • Stubblefield A., Ioannidis J., Rubin A. D.: A key recovery attack on the 802. 11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur. 7(2), 319-332 (2004).
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.2 , pp. 319-332
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.