메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-9

Visualization of complex attacks and state of attacked network

Author keywords

Complex attacks; Network security; Visualization

Indexed keywords

COMPLEX ATTACKS; DDOS ATTACK; MULTI-STEP; NUMEROUS SYSTEMS; RECOGNITION RATIO;

EID: 77949403639     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VIZSEC.2009.5375527     Document Type: Conference Paper
Times cited : (20)

References (10)
  • 4
    • 6444229776 scopus 로고    scopus 로고
    • Hyogon Kim Inhye Kang Saewoong Bahk. Real-Time Visualization of Network Attacks on High-Speed Links. In IEEE Network, 18, Issue 5, pp. 30-39, 2004.
    • Hyogon Kim Inhye Kang Saewoong Bahk. Real-Time Visualization of Network Attacks on High-Speed Links. In IEEE Network, Volume 18, Issue 5, pp. 30-39, 2004.
  • 6
    • 4243116400 scopus 로고    scopus 로고
    • The Spinning Cube of Potential Doom
    • Stephen Lau. The Spinning Cube of Potential Doom. In Communications of the ACM, Volume 47 , Issue 6, pp. 25-26, 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.6 , pp. 25-26
    • Lau, S.1
  • 7
    • 77949398850 scopus 로고    scopus 로고
    • GCube: Effective Network Visualization for High-Speed, High-Volume Networks
    • Gregory Travis. GCube: Effective Network Visualization for High-Speed, High-Volume Networks. In SEI Conference, 2008.
    • (2008) SEI Conference
    • Travis, G.1
  • 10
    • 0142250273 scopus 로고    scopus 로고
    • Visualisation for Intrusion Detection: Hooking the Worm
    • In The proceedings of the 8th European Symposium on Research in Computer Security ESORICS, of
    • Stefan Axelsson. Visualisation for Intrusion Detection: Hooking the Worm. In The proceedings of the 8th European Symposium on Research in Computer Security (ESORICS 2003), volume 2808 of LNCS, 2003.
    • (2003) LNCS , vol.2808
    • Axelsson, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.