-
4
-
-
2442480533
-
Providing security situational awareness by visualizing networks traffic flow
-
Xiaoxin Yin, William Yurcik, Yifan Li, Kiran Lakkaraju, Cristina Abad. "Providing Security Situational Awareness by Visualizing Networks Traffic Flow ", Proceedings of the IEEE 2004.
-
(2004)
Proceedings of the IEEE
-
-
Yin, X.1
Yurcik, W.2
Li, Y.3
Lakkaraju, K.4
Abad, C.5
-
5
-
-
33845960455
-
A user-centered approach to visualizing network traffic for intrusion detection
-
APRIL 2, USA
-
John R. Goodall, A. Ant Ozok, Wayne G. Lutters, Penny Rheingans, Anita Komlodi. "A User-Centered Approach to Visualizing Network Traffic for Intrusion Detection ", Proceedings of the ACM, APRIL 2, 2004, USA.
-
(2004)
Proceedings of the ACM
-
-
Goodall, J.R.1
Ozok, A.A.2
Lutters, W.G.3
Rheingans, P.4
Komlodi, A.5
-
6
-
-
76249086946
-
-
Published by the IEEE Computer Society, March/April
-
Gregory Conti, Kulsoom Abdullah, Julian Grizzard, John Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, and Chris Lee. "Countering Security Information Overload through Alert and Packet Visualization", Published by the IEEE Computer Society, March/April 2006.
-
(2006)
Countering Security Information Overload through Alert and Packet Visualization
-
-
Conti, G.1
Abdullah, K.2
Grizzard, J.3
Stasko, J.4
Copeland, J.A.5
Ahamad, M.6
Owen, H.L.7
Lee, C.8
-
8
-
-
33847293710
-
Clustering scheme for intrusion detection, improved by information theory
-
Reza Shokri, Farhad Oroumchian, Nasser Yazdani. " Clustering Scheme for Intrusion Detection, Improved by Information Theory", Proceedings of the IEEE 2005.
-
(2005)
Proceedings of the IEEE
-
-
Shokri, R.1
Oroumchian, F.2
Yazdani, N.3
-
10
-
-
76249095003
-
-
Published by the IEEE Computer Society, March/April
-
Pin Pen, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson, "IDGraph :Intrusion Detection and analysis using Stream Compositing", Published by the IEEE Computer Society, March/April 2006.
-
(2006)
IDGraph :Intrusion Detection and Analysis Using Stream Compositing
-
-
Pen, P.1
Gao, Y.2
Li, Z.3
Chen, Y.4
Watson, B.5
-
12
-
-
39049162063
-
Enhancing visual analysis of network traffic using knowledge representation
-
Ling Xiao, John Gerth, Pat Hanrahan. "Enhancing Visual Analysis of Network Traffic Using Knowledge Representation ", Proceedings of the IEEE 2006.
-
(2006)
Proceedings of the IEEE
-
-
Xiao, L.1
Gerth, J.2
Hanrahan, P.3
-
14
-
-
20444456753
-
Snort view :Visualization system of snort logs
-
Hideki Koike, Kazuhiro Ohno. "Snort View :Visualization System of Snort Logs", Proceedings of the IEEE 2004.
-
(2004)
Proceedings of the IEEE
-
-
Koike, H.1
Ohno, K.2
-
15
-
-
4644354461
-
Detecting flaws and intruder with visual data analysis
-
Published by the IEEE Computer Society
-
Soon tee, Teoh, Kwan-Liu, Ma, Soon Felix, Wu, T.J. "Detecting Flaws and Intruder with Visual Data Analysis ", Published by the IEEE Computer Society, IEEE Computer Graphics and Applications 2004.
-
(2004)
IEEE Computer Graphics and Applications
-
-
Tee, S.1
Kwan-Liu, T.2
Ma, S.F.3
Wu, T.J.4
-
16
-
-
76249095726
-
Traffic anomaly detection using k-means clustering
-
GI/ITG-Workshop MMBnet 2007, Hamburg, Germany, September
-
Gerhard Münz, Sa Li, and Georg Carle. Traffic anomaly detection using k-means clustering. In Proc. of Leistungs-, Zuverlässigkeits- und Verlässlichkeitsbewertung von Kommunikationsnetzen und Verteilten Systemen, 4. GI/ITG-Workshop MMBnet 2007, Hamburg, Germany, September 2007.
-
(2007)
Proc. of Leistungs-, Zuverlässigkeits- und Verlä sslichkeitsbewertung von Kommunikationsnetzen und Verteilten Systemen
, vol.4
-
-
Münz, G.1
Li, S.2
Carle, G.3
|