메뉴 건너뛰기




Volumn 5, Issue 4, 2012, Pages 404-421

A survey of security visualization for computer network logs

Author keywords

Logs; Network security; Security visualization

Indexed keywords

COMPUTER NETWORKS; SECURITY SYSTEMS; SURVEYS; VISUALIZATION;

EID: 84863359947     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.324     Document Type: Review
Times cited : (35)

References (140)
  • 1
    • 0242676079 scopus 로고    scopus 로고
    • Visual exploration process for the analysis of internet routing data
    • IEEE Computer Society: Washington, DC
    • Teoh ST, Ma KL, Wu SF. Visual exploration process for the analysis of internet routing data. In Proceedings of the IEEE Conference on Visualization 2003. IEEE Computer Society: Washington, DC, 2003; 523-530.
    • (2003) Proceedings of the IEEE Conference on Visualization 2003 , pp. 523-530
    • Teoh, S.T.1    Ma, K.L.2    Wu, S.F.3
  • 3
    • 84863383376 scopus 로고    scopus 로고
    • Forensic Data Visualization System: Improving Security Through Automation
    • Myrtle Beach, South Carolina, April 12-13
    • Francia G, Trifas M, Brown D, Francia R, Scott C. Forensic Data Visualization System: Improving Security Through Automation. Computer Security Conference, Myrtle Beach, South Carolina, April 12-13, 2007.
    • (2007) Computer Security Conference
    • Francia, G.1    Trifas, M.2    Brown, D.3    Francia, R.4    Scott, C.5
  • 4
    • 70350068836 scopus 로고    scopus 로고
    • Retrieving knowledge from auditing log files for computer and network forensics and accountability
    • Takahashi D, Xiao Y. Retrieving knowledge from auditing log files for computer and network forensics and accountability. Security and Communication Networks 2008; 1(2): 147-160.
    • (2008) Security and Communication Networks , vol.1 , Issue.2 , pp. 147-160
    • Takahashi, D.1    Xiao, Y.2
  • 5
    • 42649088128 scopus 로고    scopus 로고
    • Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
    • Special Issue on Security in Mobile Ad Hoc and Sensor Networks
    • Xiao Y. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communications Magazine, Special Issue on Security in Mobile Ad Hoc and Sensor Networks 2008; 46(4): 116-126.
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 116-126
    • Xiao, Y.1
  • 6
    • 74849122349 scopus 로고    scopus 로고
    • Building a wireless capturing tool for WiFi
    • DOI: 10.1002/sec.107
    • Meng K, Xiao Y, Vrbsky SV. Building a wireless capturing tool for WiFi. Security and Communication Networks 2009; 2(6): 654-668. DOI: 10.1002/sec.107
    • (2009) Security and Communication Networks , vol.2 , Issue.6 , pp. 654-668
    • Meng, K.1    Xiao, Y.2    Vrbsky, S.V.3
  • 7
    • 70350060199 scopus 로고    scopus 로고
    • Flow-net methodology for accountability in wireless networks
    • Xiao Y. Flow-net methodology for accountability in wireless networks. IEEE Network 2009; 23(5): 30-37.
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1
  • 13
    • 77949732329 scopus 로고    scopus 로고
    • Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
    • Guo H, Mu Y, Zhang XY, Li ZJ. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. International Journal of Security and Networks 2010; 5(2/3): 173-187.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 173-187
    • Guo, H.1    Mu, Y.2    Zhang, X.Y.3    Li, Z.J.4
  • 18
    • 77949692385 scopus 로고    scopus 로고
    • Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
    • Dalton II GC, Edge KS, Mills RF, Raines RA. Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees. International Journal of Security and Networks 2010; 5(2/3): 87-95.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 87-95
    • Dalton II, G.C.1    Edge, K.S.2    Mills, R.F.3    Raines, R.A.4
  • 22
    • 77949694146 scopus 로고    scopus 로고
    • Security and privacy on low-cost radio frequency identification systems
    • Sun L. Security and privacy on low-cost radio frequency identification systems. International Journal of Security and Networks 2010; 5(2/3): 128-134.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 128-134
    • Sun, L.1
  • 24
    • 77949765113 scopus 로고    scopus 로고
    • Radio frequency identification: a case study of healthcare organisations
    • Azevedo SG, Ferreira JJ. Radio frequency identification: a case study of healthcare organisations. International Journal of Security and Networks 2010; 5(2/3): 147-155.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 147-155
    • Azevedo, S.G.1    Ferreira, J.J.2
  • 25
    • 77949750049 scopus 로고    scopus 로고
    • A ubiquitous mobile telemedicine system for the elderly using RFID
    • Raad M. A ubiquitous mobile telemedicine system for the elderly using RFID. International Journal of Security and Networks 2010; 5(2/3): 156-164.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 156-164
    • Raad, M.1
  • 26
    • 77949666177 scopus 로고    scopus 로고
    • Perceived barriers to the widespread commercial use of radio frequency identification technology
    • Rodrigues MJ, James K. Perceived barriers to the widespread commercial use of radio frequency identification technology. International Journal of Security and Networks 2010; 5(2/3): 165-172.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 165-172
    • Rodrigues, M.J.1    James, K.2
  • 28
    • 77949837905 scopus 로고    scopus 로고
    • A backpressure technique for filtering spoofed traffic at upstream routers
    • Malliga S, Tamilarasi A. A backpressure technique for filtering spoofed traffic at upstream routers. International Journal of Security and Networks 2010; 5(1): 3-14.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 3-14
    • Malliga, S.1    Tamilarasi, A.2
  • 29
    • 77949801623 scopus 로고    scopus 로고
    • Authentication and secret search mechanisms for RFID-aware wireless sensor networks
    • Huang S, Shieh S. Authentication and secret search mechanisms for RFID-aware wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 15-25.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 15-25
    • Huang, S.1    Shieh, S.2
  • 30
    • 77949844099 scopus 로고    scopus 로고
    • An efficient secure data dissemination scheme for grid structure wireless sensor networks
    • Hsiao Y, Hwang R. An efficient secure data dissemination scheme for grid structure wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 26-34.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 26-34
    • Hsiao, Y.1    Hwang, R.2
  • 31
    • 77949835881 scopus 로고    scopus 로고
    • Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
    • Xu L, Chen S, Huang X, Mu Y. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. International Journal of Security and Networks 2010; 5(1): 35-44.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 35-44
    • Xu, L.1    Chen, S.2    Huang, X.3    Mu, Y.4
  • 32
    • 77949817850 scopus 로고    scopus 로고
    • Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
    • Tsai K, Hsu C, Wu T. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. International Journal of Security and Networks 2010; 5(1): 45-52.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 45-52
    • Tsai, K.1    Hsu, C.2    Wu, T.3
  • 33
    • 77949864345 scopus 로고    scopus 로고
    • Lightweight authentication protocol for mobile RFID networks
    • Yang M. Lightweight authentication protocol for mobile RFID networks. International Journal of Security and Networks 2010; 5(1): 53-62.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 53-62
    • Yang, M.1
  • 34
    • 77949830969 scopus 로고    scopus 로고
    • A cross-layer authentication design for secure video transportation in wireless sensor network
    • Wang J, Smith GL. A cross-layer authentication design for secure video transportation in wireless sensor network. International Journal of Security and Networks 2010; 5(1): 63-76.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 63-76
    • Wang, J.1    Smith, G.L.2
  • 35
    • 70349969846 scopus 로고    scopus 로고
    • A proactive secret sharing scheme in matrix projection method
    • Bai L, Zou X. A proactive secret sharing scheme in matrix projection method. International Journal of Security and Networks 2009; 4(4): 201-209.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 201-209
    • Bai, L.1    Zou, X.2
  • 37
  • 38
    • 70349949111 scopus 로고    scopus 로고
    • Visibility: a novel concept for characterising provable network digital evidences
    • Rekhis S, Boudriga NA. Visibility: a novel concept for characterising provable network digital evidences. International Journal of Security and Networks 2009; 4(4): 234-245.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 234-245
    • Rekhis, S.1    Boudriga, N.A.2
  • 40
    • 70349968010 scopus 로고    scopus 로고
    • Attacks and countermeasures in multi-hop cognitive radio networks
    • Hu F, Dong D, Xiao Y. Attacks and countermeasures in multi-hop cognitive radio networks. International Journal of Security and Networks 2009; 4(4): 263-271.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 263-271
    • Hu, F.1    Dong, D.2    Xiao, Y.3
  • 42
    • 68149158275 scopus 로고    scopus 로고
    • An efficient one-time password authentication scheme using a smart card
    • Lee S, Sivalingam KM. An efficient one-time password authentication scheme using a smart card. International Journal of Security and Networks 2009; 4(3): 145-152.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 145-152
    • Lee, S.1    Sivalingam, K.M.2
  • 46
    • 68149180871 scopus 로고    scopus 로고
    • Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
    • Ehlert S, Rebahi Y, Magedanz T. Intrusion detection system for denial-of-service flooding attacks in SIP communication networks. International Journal of Security and Networks 2009; 4(3): 189-200.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 189-200
    • Ehlert, S.1    Rebahi, Y.2    Magedanz, T.3
  • 47
    • 61849085156 scopus 로고    scopus 로고
    • An evaluation of connection characteristics for separating network attacks
    • Berthier R, Cukier M. An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks 2009; 4(1/2): 110-124.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 110-124
    • Berthier, R.1    Cukier, M.2
  • 48
    • 61849158146 scopus 로고    scopus 로고
    • An efficient group key management scheme for mobile ad hoc networks
    • Wu B, Wu J, Dong Y. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks 2009; 4(1/2): 125-134.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 125-134
    • Wu, B.1    Wu, J.2    Dong, Y.3
  • 57
    • 61849158147 scopus 로고    scopus 로고
    • Designing user studies for security applications: a case study with wireless network configuration
    • Kuo C, Perrig A, Walker J. Designing user studies for security applications: a case study with wireless network configuration. International Journal of Security and Networks 2009; 409(1/2): 101-109.
    • (2009) International Journal of Security and Networks , vol.409 , Issue.1-2 , pp. 101-109
    • Kuo, C.1    Perrig, A.2    Walker, J.3
  • 58
    • 79551645150 scopus 로고    scopus 로고
    • An one-way function based framework for pairwise key establishment in sensor networks
    • Ma L, Teymorian AY, Xing K, Du D. An one-way function based framework for pairwise key establishment in sensor networks. International Journal of Security and Networks 2008; 3(4): 217-225.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 217-225
    • Ma, L.1    Teymorian, A.Y.2    Xing, K.3    Du, D.4
  • 60
    • 77953193668 scopus 로고    scopus 로고
    • NTP-DownloadT: a conformance test tool for secured mobile download services
    • Hsieh C, Chen J, Lin Y-B, et al. NTP-DownloadT: a conformance test tool for secured mobile download services. International Journal of Security and Networks 2008; 3(4): 240-249.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 240-249
    • Hsieh, C.1    Chen, J.2    Lin, Y.-B.3
  • 62
    • 79551651366 scopus 로고    scopus 로고
    • Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
    • Kandikattu R, Jacob L. Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks. International Journal of Security and Networks 2008; 3(4): 258-274.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 258-274
    • Kandikattu, R.1    Jacob, L.2
  • 65
    • 77954327354 scopus 로고    scopus 로고
    • PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks
    • Li F, Srinivasan A, Wu J. PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks. International Journal of Security and Networks 2008: 3(3): 173-182.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 173-182
    • Li, F.1    Srinivasan, A.2    Wu, J.3
  • 67
    • 72549101766 scopus 로고    scopus 로고
    • An agent-based framework for intrusion detection alert verification and event correlation
    • Uphoff B, Wong JS. An agent-based framework for intrusion detection alert verification and event correlation. International Journal of Security and Networks 2008; 3(3): 193-200.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 193-200
    • Uphoff, B.1    Wong, J.S.2
  • 68
    • 79951661564 scopus 로고    scopus 로고
    • Secure user-identification and key distribution scheme preserving anonymity
    • Tripathy S, Nandi S. Secure user-identification and key distribution scheme preserving anonymity. International Journal of Security and Networks 2008; 3(3): 201-205.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 201-205
    • Tripathy, S.1    Nandi, S.2
  • 69
    • 77952481544 scopus 로고    scopus 로고
    • ID-based threshold proxy signcryption scheme from bilinear pairings
    • Li F, Xin X, Hu Y. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks 2008; 3(3): 206-215.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 206-215
    • Li, F.1    Xin, X.2    Hu, Y.3
  • 70
  • 73
    • 77955714466 scopus 로고    scopus 로고
    • Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
    • Ray I, Poolsappasit N. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks 2008; 3(2): 80-94.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 80-94
    • Ray, I.1    Poolsappasit, N.2
  • 78
    • 84863373862 scopus 로고    scopus 로고
    • Encyclopedia Britannica: Definition of Data Mining.
    • Clifton C. Encyclopedia Britannica: Definition of Data Mining., 2010.
    • (2010)
    • Clifton, C.1
  • 80
    • 0002283033 scopus 로고    scopus 로고
    • From data mining to knowledge discovery in databases
    • Fayyad U, Piatetsky-Shapiro G, Smyth P. From data mining to knowledge discovery in databases. AI Magazine 1996; 17(3): 37-54.
    • (1996) AI Magazine , vol.17 , Issue.3 , pp. 37-54
    • Fayyad, U.1    Piatetsky-Shapiro, G.2    Smyth, P.3
  • 81
    • 0003280548 scopus 로고    scopus 로고
    • Mining Databases: Towards Algorithms for Knowledge Discovery
    • Fayyad UM. Mining Databases: Towards Algorithms for Knowledge Discovery. Data Engineering Bulletin 1998; 21(1): 39-48.
    • (1998) Data Engineering Bulletin , vol.21 , Issue.1 , pp. 39-48
    • Fayyad, U.M.1
  • 82
    • 0002433547 scopus 로고    scopus 로고
    • From data mining to knowledge discovery: an overview
    • Fayyad UM, eds.) AAAI Press and MIT Press: Menlo Park, CA/Cambridge, MA
    • Fayyad UM, Piatetsky-Shapiro G, Smith P. From data mining to knowledge discovery: an overview. In Advances in Knowledge Discovery and Data Mining, Fayyad UM et al., (eds.) AAAI Press and MIT Press: Menlo Park, CA/Cambridge, MA, 1996; 1-34.
    • (1996) Advances in Knowledge Discovery and Data Mining , pp. 1-34
    • Fayyad, U.M.1    Piatetsky-Shapiro, G.2    Smith, P.3
  • 83
    • 0034838197 scopus 로고    scopus 로고
    • Data mining methods for detection of new malicious executables. In Proceedings of the IEEE Symposium on Security and Privacy
    • Schultz MG, Eskin E, Zadok E, Stolfo SJ. Data mining methods for detection of new malicious executables. In Proceedings of the IEEE Symposium on Security and Privacy, 2001.
    • (2001)
    • Schultz, M.G.1    Eskin, E.2    Zadok, E.3    Stolfo, S.J.4
  • 84
    • 85084160308 scopus 로고    scopus 로고
    • A study in using neural networks for anomaly and misuse detection
    • Proceedings of the Eighth USENIX Security Symposium
    • Ghosh AK, Schwartzbard A. A study in using neural networks for anomaly and misuse detection. In Proceedings of the Eighth USENIX Security Symposium, 1999.
    • (1999)
    • Ghosh, A.K.1    Schwartzbard, A.2
  • 85
    • 44049102761 scopus 로고    scopus 로고
    • Considering both intra-pattern and inter-pattern anomalies for intrusion detection
    • Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM'02)
    • Jiang N, Hua K, Sheu S. Considering both intra-pattern and inter-pattern anomalies for intrusion detection, In Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM'02), 2002.
    • (2002)
    • Jiang, N.1    Hua, K.2    Sheu, S.3
  • 86
    • 23544449776 scopus 로고    scopus 로고
    • Learning models of network traffic for detecting novel attacks
    • Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03)
    • Mahoney MV, Chan PK. Learning models of network traffic for detecting novel attacks. In Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03), 2003.
    • (2003)
    • Mahoney, M.V.1    Chan, P.K.2
  • 87
    • 84942248748 scopus 로고    scopus 로고
    • Finding the vocabulary of program behavior data for anomaly detection
    • Proceedings DISCEX '03
    • Michael CC. Finding the vocabulary of program behavior data for anomaly detection. In Proceedings DISCEX '03, 2003.
    • (2003)
    • Michael, C.C.1
  • 88
    • 33746368048 scopus 로고    scopus 로고
    • Enhancing security using mobility-based anomaly detection in cellular mobile networks
    • Sun B, Yu F, Wu K, Xiao Y, Leung VCM. Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Transactions on Vehicular Technology 2006; 55(4):1385-1396.
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.4 , pp. 1385-1396
    • Sun, B.1    Yu, F.2    Wu, K.3    Xiao, Y.4    Leung, V.C.M.5
  • 89
    • 34250761381 scopus 로고    scopus 로고
    • Integration of mobility and intrusion detection for wireless ad hoc networks
    • Sun B, Wu K, Xiao Y, Wang R. Integration of mobility and intrusion detection for wireless ad hoc networks. International Journal of Communication Systems 2007; 20(6): 695-721.
    • (2007) International Journal of Communication Systems , vol.20 , Issue.6 , pp. 695-721
    • Sun, B.1    Wu, K.2    Xiao, Y.3    Wang, R.4
  • 93
    • 84863373864 scopus 로고    scopus 로고
    • A prototype tool for visual data mining of network traffic for intrusion detection
    • Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC'03)
    • Yurcik W, Lakkaraju K, Barlow J, Rosendale J. A prototype tool for visual data mining of network traffic for intrusion detection. In Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC'03), 2003.
    • (2003)
    • Yurcik, W.1    Lakkaraju, K.2    Barlow, J.3    Rosendale, J.4
  • 95
    • 84948658749 scopus 로고    scopus 로고
    • Tudumi: information visualization system for monitoring and auditing computer logs
    • Proceedings of the Sixth International Conference on Information Visualization
    • Takada T, Koike H. Tudumi: information visualization system for monitoring and auditing computer logs. In Proceedings of the Sixth International Conference on Information Visualization, 2002.
    • (2002)
    • Takada, T.1    Koike, H.2
  • 96
    • 0034592922 scopus 로고    scopus 로고
    • Towards an effective cooperation of the user and the computer for classification
    • Proceedings of the Sixth International Conference on Knowledge Discovery and Data Mining (KDD '00)
    • Ankerst M, Ester M, Kriegel H-P. Towards an effective cooperation of the user and the computer for classification. In Proceedings of the Sixth International Conference on Knowledge Discovery and Data Mining (KDD '00), 2000.
    • (2000)
    • Ankerst, M.1    Ester, M.2    Kriegel, H.-P.3
  • 98
    • 85094574423 scopus 로고    scopus 로고
    • Mielog: a highly interactive visual log browser using information visualization and statistical analysis
    • The USENIX Association: Berkeley, CA
    • Takada T, Koike H. Mielog: a highly interactive visual log browser using information visualization and statistical analysis. In Proceedings of LISA XVI Sixteenth Systems Administration Conference. The USENIX Association: Berkeley, CA, 2002; 133-144.
    • (2002) Proceedings of LISA XVI Sixteenth Systems Administration Conference , pp. 133-144
    • Takada, T.1    Koike, H.2
  • 100
    • 0032121774 scopus 로고    scopus 로고
    • Exploring large graphs in 3D hyperbolic space
    • Munzner T. Exploring large graphs in 3D hyperbolic space. IEEE Computer Graphics and Applications 1998; 18(4): 18-23.
    • (1998) IEEE Computer Graphics and Applications , vol.18 , Issue.4 , pp. 18-23
    • Munzner, T.1
  • 104
    • 84947618408 scopus 로고    scopus 로고
    • Geolocations. Available from:
    • Geolocations. Available from:
  • 106
    • 33745202013 scopus 로고    scopus 로고
    • Improving the computer forensic analysis process through visualization
    • Teelink S, Erbacher RT. Improving the computer forensic analysis process through visualization. Communications of the ACM 2006; 49: 71-75.
    • (2006) Communications of the ACM , vol.49 , pp. 71-75
    • Teelink, S.1    Erbacher, R.T.2
  • 109
    • 84947614660 scopus 로고    scopus 로고
    • Available from:
    • Available from:
  • 111
    • 70350708245 scopus 로고    scopus 로고
    • Interactive visualization for network and port scan detection
    • Proceedings of Visualization for Computer Security, October .
    • Muelder C, Ma K, Bartoletti T. Interactive visualization for network and port scan detection. In Proceedings of Visualization for Computer Security, October 2006.
    • (2006)
    • Muelder, C.1    Ma, K.2    Bartoletti, T.3
  • 112
    • 33745202013 scopus 로고    scopus 로고
    • Improving the computer forensic analysis process through visualization
    • Teerlink S, Erbacher RF. Improving the computer forensic analysis process through visualization. Communications of the ACM 2006; 49(2): 71-75.
    • (2006) Communications of the ACM , vol.49 , Issue.2 , pp. 71-75
    • Teerlink, S.1    Erbacher, R.F.2
  • 114
    • 20444495766 scopus 로고    scopus 로고
    • PortVis: a tool for port-based detection of security events. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop Visualization and Data Mining for Computer Security
    • McPherson J, Ma K-L, Krystosk P, Bartoletti T, Christensen M. PortVis: a tool for port-based detection of security events. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop Visualization and Data Mining for Computer Security, 2004.
    • (2004)
    • McPherson, J.1    Ma, K.-L.2    Krystosk, P.3    Bartoletti, T.4    Christensen, M.5
  • 115
    • 39749136667 scopus 로고    scopus 로고
    • Support for computer forensics examination planning with domain modeling: a report of one experiment trial
    • Proceedings of the 40th Hawaii International Conference on Systems Sciences, January
    • Bogen A, Dampier D, Carver J. Support for computer forensics examination planning with domain modeling: a report of one experiment trial. In Proceedings of the 40th Hawaii International Conference on Systems Sciences, January 2007; pp. 267b.
    • (2007)
    • Bogen, A.1    Dampier, D.2    Carver, J.3
  • 117
    • 0025568642 scopus 로고
    • Parallel coordinates: a tool for visualizing multi-dimensional geometry
    • Los Alamitos, CA. IEEE Computer Society Press: Washington, DC
    • Inselberg A, Dimsdale B. Parallel coordinates: a tool for visualizing multi-dimensional geometry. In VIS '90: Proceedings of the First Conference on Visualization '90, Los Alamitos, CA. IEEE Computer Society Press: Washington, DC, 1990; 361-378.
    • (1990) VIS '90: Proceedings of the First Conference on Visualization '90 , pp. 361-378
    • Inselberg, A.1    Dimsdale, B.2
  • 121
    • 84947617897 scopus 로고    scopus 로고
    • Available from:
    • Available from:
  • 124
    • 84947617488 scopus 로고    scopus 로고
    • Available from:
    • Available from:
  • 125
    • 84947618613 scopus 로고    scopus 로고
    • Available from:
    • Available from:
  • 127
    • 55349125312 scopus 로고    scopus 로고
    • Vertical and horizontal synchronization services with outlier detection in underwater sensor networks
    • Hu F, Malkawi Y, Kumar S, Xiao Y. Vertical and horizontal synchronization services with outlier detection in underwater sensor networks. Wireless Communications and Mobile 2008; 8(9): 1165-1181.
    • (2008) Wireless Communications and Mobile , vol.8 , Issue.9 , pp. 1165-1181
    • Hu, F.1    Malkawi, Y.2    Kumar, S.3    Xiao, Y.4
  • 128
    • 0036448607 scopus 로고    scopus 로고
    • Case study: interactive visualization for internet security. In 13th IEEE Visualization 2002 (VIS 2002)
    • Teoh ST, Ma KL, Wu SF, Zhao X. Case study: interactive visualization for internet security. In 13th IEEE Visualization 2002 (VIS 2002), 2002.
    • (2002)
    • Teoh, S.T.1    Ma, K.L.2    Wu, S.F.3    Zhao, X.4
  • 129
    • 84863373875 scopus 로고
    • Detecting intruders in computer systems
    • Proceedings of the 1993 Conference on Auditing and Computer Technology
    • Teoh ST, Zhang K, Tseng S, Ma KL, Wu SF, Lunt T. Detecting intruders in computer systems. In Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993.
    • (1993)
    • Teoh, S.T.1    Zhang, K.2    Tseng, S.3    Ma, K.L.4    Wu, S.F.5    Lunt, T.6
  • 130
    • 19444386335 scopus 로고
    • Detecting intruders in computer systems
    • Proceedings of the 1993 Conference on Auditing and Computer Technology
    • Lunt T. Detecting intruders in computer systems. In Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993.
    • (1993)
    • Lunt, T.1
  • 131
    • 84863375589 scopus 로고
    • A border gateway protocol 4 (bgp-4). RFC 1771
    • Rekhter Y, Li T. A border gateway protocol 4 (bgp-4). RFC 1771, 1995.
    • (1995)
    • Rekhter, Y.1    Li, T.2
  • 132
    • 84947617285 scopus 로고    scopus 로고
    • Note
    • Inappropriate Content Visualization.
  • 133
    • 85094313960 scopus 로고    scopus 로고
    • Bridging the host-network divide: survey, taxonomy, and solution
    • Washington, DC. USENIX Association: Berkeley, CA
    • Fink GA, Duggirala V, Correa R, North C.Bridging the host-network divide: survey, taxonomy, and solution. In Proceedings of LISA '06, Washington, DC. USENIX Association: Berkeley, CA, 2006; 247-262.
    • (2006) Proceedings of LISA '06 , pp. 247-262
    • Fink, G.A.1    Duggirala, V.2    Correa, R.3    North, C.4
  • 134
    • 84863375587 scopus 로고    scopus 로고
    • CluVis dual-domain visual exploration of cluster network metadata
    • Proceedings of the 45th Annual Southeast Regional Conference, ACMSE '07
    • Teoh ST, Ma KL, Wu SF, Zhao X. CluVis dual-domain visual exploration of cluster network metadata. In Proceedings of the 45th Annual Southeast Regional Conference, ACMSE '07, 2007.
    • (2007)
    • Teoh, S.T.1    Ma, K.L.2    Wu, S.F.3    Zhao, X.4
  • 136
    • 33749513452 scopus 로고    scopus 로고
    • A visualization methodology for characterization of network scans
    • Proceedings of the IEEE Workshop Visualization for Computer Security (VizSEC), Oct. .
    • Muelder C, Ma K-L, Bartoletti T. A visualization methodology for characterization of network scans. In Proceedings of the IEEE Workshop Visualization for Computer Security (VizSEC), Oct. 2005.
    • (2005)
    • Muelder, C.1    Ma, K.-L.2    Bartoletti, T.3
  • 137
    • 0032676506 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • Proceedings of the IEEE Symposium on Security and Privacy
    • Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. In Proceedings of the IEEE Symposium on Security and Privacy, 1999.
    • (1999)
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 139
    • 14644441680 scopus 로고    scopus 로고
    • Visualization for security
    • Ma K-L. Visualization for security. Computer Graphics 2004; 38(4): 4-6.
    • (2004) Computer Graphics , vol.38 , Issue.4 , pp. 4-6
    • Ma, K.-L.1
  • 140
    • 84863379863 scopus 로고    scopus 로고
    • How Much Information, Available from:
    • Peter L, Varian HR. How Much Information, 2003. Available from:
    • (2003)
    • Peter, L.1    Varian, H.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.