-
1
-
-
20444456753
-
SnortView: Visualization System of Snort Logs
-
Hideki Koike, Kazuhiro Ohno, SnortView: Visualization System of Snort Logs, Proceedings of the ACM workshop on Visualization and data mining for computer security, Washington DC, USA, 2004.
-
Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security, Washington DC, USA, 2004
-
-
Koike, H.1
Ohno, K.2
-
2
-
-
35248864777
-
A Reliable Analyzer and Archiver for Snort Intrusion Detection System
-
Soleimani M., Khosrowshahi E., Doroud M., Damanafshan M., Behzadi A., Abbaspour M., A Reliable Analyzer and Archiver for Snort Intrusion Detection System, Proceedings of the 2007 ACM symposium on Applied computing, Korea, 2007.
-
Proceedings of the 2007 ACM Symposium on Applied Computing, Korea, 2007
-
-
Soleimani, M.1
Khosrowshahi, E.2
Doroud, M.3
Damanafshan, M.4
Behzadi, A.5
Abbaspour, M.6
-
3
-
-
34547269828
-
Visualizations to improve reactivity towards security incidents inside corporate networks
-
Patrick Hertzog, Visualizations to improve reactivity towards security incidents inside corporate networks, Proceedings of the 3rd international workshop on Visualization for computer security, Alexandria, Virginia, USA, 2006.
-
Proceedings of the 3rd International Workshop on Visualization for Computer Security, Alexandria, Virginia, USA, 2006
-
-
Hertzog, P.1
-
4
-
-
34547337787
-
An intelligent, interactive tool for exploration and visualization of time-oriented security data
-
Shabtai, Klimov, Shahar, Elovici, An intelligent, interactive tool for exploration and visualization of time-oriented security data, Proceedings of the 3rd international workshop on Visualization for computer security, Alexandria, Virginia, USA, 2006
-
Proceedings of the 3rd International Workshop on Visualization for Computer Security, Alexandria, Virginia, USA, 2006
-
-
Shabtai1
Klimov2
Shahar3
Elovici4
-
5
-
-
74049124161
-
Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations
-
Mansmann, Fisher, Keim, North, Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations, Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology, Maryland, USA, 2009.
-
Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology, Maryland, USA, 2009
-
-
Mansmann1
Fisher2
Keim3
North4
-
6
-
-
34547299999
-
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams
-
Mathew, Giomundo, Uoadhyaya, Sudit,Slotz, Understanding multistage attacks by attack-track based visualization of heterogeneous event streams, Proceedings of the 3rd international workshop on Visualization for computer security, Virginia, USA, 2006.
-
Proceedings of the 3rd International Workshop on Visualization for Computer Security, Virginia, USA, 2006
-
-
Mathew1
Giomundo2
Uoadhyaya3
Sudit4
Slotz5
-
7
-
-
34547342010
-
Tool update: High alarm count issues in IDS rainstorm
-
Abdullah, Copeland, Tool update: high alarm count issues in IDS rainstorm, Proceedings of the 3rd international workshop on Visualization for computer security, Alexandria, Virginia, USA, 2006.
-
Proceedings of the 3rd International Workshop on Visualization for Computer Security, Alexandria, Virginia, USA, 2006
-
-
Abdullah1
Copeland2
-
8
-
-
26844574201
-
Applying data mining to intrusion detection: The quest for automation, efficiency, and credibility
-
December
-
Wenke Lee, Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility, ACM SIGKDD Explorations Newsletter, December, 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
-
-
Lee, W.1
-
10
-
-
0002365658
-
Learning Program Behavior Profiles for Intrusion Detection
-
Anup K.Ghosh, Aaron Schwartzbard and Michael Schatz. Learning Program Behavior Profiles for Intrusion Detection. Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, pp.51-62, 2002.
-
(2002)
Proceedings of the 1st Conference on Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California
, pp. 51-62
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
12
-
-
78649305211
-
-
The snort. http://www.snort.org.
-
-
-
-
15
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Klaus Juslich.Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security, vol. 6, pp. 443-471, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.6
, pp. 443-471
-
-
Juslich, K.1
-
16
-
-
84869129317
-
A user - Centered approach to visualizing network traffic for intrusion detection
-
Portland, OR, USA, April
-
John R. Goodall and A. Ant Ozok and Wayne G. Lutters and Penny Rheingans and Anita Komlodi. A user - centered approach to visualizing network traffic for intrusion detection. Extended Abstracts on Human Factors in Computing Systems, pp. 1403 -1406, Portland, OR, USA, April, 2005.
-
(2005)
Extended Abstracts on Human Factors in Computing Systems
, pp. 1403-1406
-
-
Goodall, J.R.1
Ozok, A.A.2
Lutters, W.G.3
Rheingans, P.4
Komlodi, A.5
-
18
-
-
0012249331
-
Using q-grams in a DBMS for approximate string processing
-
Luis Gravano and Panagiotis G. Ipeirotis and H. V. Jagadish and Nick Koudas and S. Muthukrishnan and Lauri Pietarinen and Divesh Srivastava. Using q-grams in a DBMS for approximate string processing. IEEE Data Engineering Bulletin. pp.28-34, vol. 24, 2001.
-
(2001)
IEEE Data Engineering Bulletin
, vol.24
, pp. 28-34
-
-
Gravano, L.1
Ipeirotis, P.G.2
Jagadish, H.V.3
Koudas, N.4
Muthukrishnan, S.5
Pietarinen, L.6
Srivastava, D.7
-
19
-
-
33749532337
-
Preserving the Big Picture: Visual Network Traffic Analysis with TNV
-
IEEE Press
-
Goodall, John R., Wayne G. Lutters, Penny Rheingans, and Anita Komlodi. "Preserving the Big Picture: Visual Network Traffic Analysis with TNV." Proceedings of the Workshop on Visualization for Computer Security (VizSec), IEEE Press, 2005, 47-54.
-
(2005)
Proceedings of the Workshop on Visualization for Computer Security (VizSec)
, pp. 47-54
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
|