-
1
-
-
49049104680
-
-
Geordia State University, US
-
Rawiroj R. Kasemsri, A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques, under the direction of Ying Zhu, Geordia State University, US, 2005.
-
(2005)
A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques, under the direction of Ying Zhu
-
-
Kasemsri, R.R.1
-
2
-
-
33749520207
-
IDS RainStorm: Visualizing IDS Alarms
-
Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland, John Stasko. IDS RainStorm: Visualizing IDS Alarms. In IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05), pp. 1-10, 2005.
-
(2005)
IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)
, pp. 1-10
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
Stasko, J.5
-
3
-
-
33749522392
-
Visual Firewall: Real-time Network Security Monitor
-
Chris P. Lee, Jason Trost, Nicholas Gibbs, Raheem Beyah, John A. Copeland. Visual Firewall: Real-time Network Security Monitor. In IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05), pp. 129-136, 2005.
-
(2005)
IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)
, pp. 129-136
-
-
Lee, C.P.1
Trost, J.2
Gibbs, N.3
Beyah, R.4
Copeland, J.A.5
-
4
-
-
6444229776
-
-
Hyogon Kim Inhye Kang Saewoong Bahk. Real-Time Visualization of Network Attacks on High-Speed Links. In IEEE Network, 18, Issue 5, pp. 30-39, 2004.
-
Hyogon Kim Inhye Kang Saewoong Bahk. Real-Time Visualization of Network Attacks on High-Speed Links. In IEEE Network, Volume 18, Issue 5, pp. 30-39, 2004.
-
-
-
-
5
-
-
20444447760
-
Home-centric Visualization of Network Traffic for Security Administration
-
ACM Press, Washington DC, USA, pp
-
Robert Ball, Glenn A. Fink, Chris North. Home-centric Visualization of Network Traffic for Security Administration. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, ACM Press, Washington DC, USA, pp. 55-64, 2004.
-
(2004)
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
-
6
-
-
4243116400
-
The Spinning Cube of Potential Doom
-
Stephen Lau. The Spinning Cube of Potential Doom. In Communications of the ACM, Volume 47 , Issue 6, pp. 25-26, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 25-26
-
-
Lau, S.1
-
7
-
-
77949398850
-
GCube: Effective Network Visualization for High-Speed, High-Volume Networks
-
Gregory Travis. GCube: Effective Network Visualization for High-Speed, High-Volume Networks. In SEI Conference, 2008.
-
(2008)
SEI Conference
-
-
Travis, G.1
-
9
-
-
35948940663
-
Monitoring Network Traffic with Radial Traffic Analyzer
-
Baltimore, MD, pp
-
Daniel A. Keim, Florian Mansmann, Jorn Schneidewind, Tobias Schreck. Monitoring Network Traffic with Radial Traffic Analyzer. In 2006 IEEE Symposium On Visual Analytics Science And Technology, Baltimore, MD, pp. 123-128, 2006.
-
(2006)
2006 IEEE Symposium On Visual Analytics Science And Technology
, pp. 123-128
-
-
Keim, D.A.1
Mansmann, F.2
Schneidewind, J.3
Schreck, T.4
-
10
-
-
0142250273
-
Visualisation for Intrusion Detection: Hooking the Worm
-
In The proceedings of the 8th European Symposium on Research in Computer Security ESORICS, of
-
Stefan Axelsson. Visualisation for Intrusion Detection: Hooking the Worm. In The proceedings of the 8th European Symposium on Research in Computer Security (ESORICS 2003), volume 2808 of LNCS, 2003.
-
(2003)
LNCS
, vol.2808
-
-
Axelsson, S.1
|