-
2
-
-
62249168871
-
A hybrid intrusion detection system design for computer network security
-
M. A. Aydin, A. H. Zaim, and K. Gkhan Ceylan. A hybrid intrusion detection system design for computer network security. Computers and Electrical Engineering, 35(1):517-526, 2009.
-
(2009)
Computers and Electrical Engineering
, vol.35
, Issue.1
, pp. 517-526
-
-
Aydin, M.A.1
Zaim, A.H.2
Ceylan, K.G.3
-
6
-
-
78149232727
-
Uncovering strengths and weaknesses of radial visualizations-an empirical approach
-
S. Diehl, F. Beck, and M. Burch. Uncovering strengths and weaknesses of radial visualizations-an empirical approach. IEEE Transactions on Visualization and Computer Graphics, 16(6):935-942, 2010.
-
(2010)
IEEE Transactions on Visualization and Computer Graphics
, vol.16
, Issue.6
, pp. 935-942
-
-
Diehl, S.1
Beck, F.2
Burch, M.3
-
7
-
-
33749530507
-
Multi-node monitoring and intrusion detection
-
R. F. Erbacher, Z. Teng, and S. Pandit. Multi-node monitoring and intrusion detection. In International Conference on Visualization, Imaging and Image Processing, pages 720-725, 2002.
-
(2002)
International Conference on Visualization, Imaging and Image Processing
, pp. 720-725
-
-
Erbacher, R.F.1
Teng, Z.2
Pandit, S.3
-
8
-
-
56449095222
-
Large-scale network monitoring for visual analysis of attacks
-
F. Fischer, F. Mansmann, D. A. Keim, S. Pietzko, and M. Waldvogel. Large-scale network monitoring for visual analysis of attacks. In the 5th International Workshop on Visualization for Computer Security, page 111, 2008.
-
(2008)
The 5th International Workshop on Visualization for Computer Security
, pp. 111
-
-
Fischer, F.1
Mansmann, F.2
Keim, D.A.3
Pietzko, S.4
Waldvogel, M.5
-
12
-
-
38149004399
-
A scalable aural-visual environment for security event monitoring, analysis and response
-
P. Z. Kolano. A scalable aural-visual environment for security event monitoring, analysis and response. In International conference on Advances in visual computing, pages 564-575, 2007.
-
(2007)
International Conference on Advances in Visual Computing
, pp. 564-575
-
-
Kolano, P.Z.1
-
13
-
-
33745456201
-
Realtime and forensic network data analysis using animated and coordinated visualization
-
S. Krasser, G. Conti, J. Grizzard, J. Gribschaw, and H. Owen. Realtime and forensic network data analysis using animated and coordinated visualization. In IEEE Workshop on Information Assurance and Security, pages 42-49, 2005.
-
(2005)
IEEE Workshop on Information Assurance and Security
, pp. 42-49
-
-
Krasser, S.1
Conti, G.2
Grizzard, J.3
Gribschaw, J.4
Owen, H.5
-
14
-
-
33749522392
-
Visual firewall: Real-time network security monitor
-
C. Lee, J. Trost, N. Gibbs, R. Beyah, and J. Copeland. Visual firewall: Real-time network security monitor. In IEEE Workshop visualizaiton for computer security, 2005.
-
(2005)
IEEE Workshop Visualizaiton for Computer Security
-
-
Lee, C.1
Trost, J.2
Gibbs, N.3
Beyah, R.4
Copeland, J.5
-
16
-
-
57649227949
-
-
chapter 5, Addison-Wesley Professional
-
R. Marty. Applied Security Visualization, chapter 5, pages 161-237. Addison-Wesley Professional, 2008.
-
(2008)
Applied Security Visualization
, pp. 161-237
-
-
Marty, R.1
-
17
-
-
20444495766
-
PortVis: A tool for port-based detection of security events
-
J. McPherson, K.-L. Ma, P. Krystosk, T. Bartoletti, and M. Christensen. PortVis: a tool for port-based detection of security events. In ACM workshop on Visualization and data mining for computer security, pages 73-81, 2004.
-
(2004)
ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 73-81
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
19
-
-
84881054938
-
Improving the performance of passive network monitoring applications with memory locality enhancements
-
A. Papadogiannakis, G. Vasiliadis, D. Antoniades, M. Polychronakis, and E. P. Markatos. Improving the performance of passive network monitoring applications with memory locality enhancements. Computer Communications, 34:1-15, 2011.
-
(2011)
Computer Communications
, vol.34
, pp. 1-15
-
-
Papadogiannakis, A.1
Vasiliadis, G.2
Antoniades, D.3
Polychronakis, M.4
Markatos, E.P.5
-
21
-
-
85094574423
-
MieLog: A highly interactive visual log browser using information visualization and statistical analysis
-
T. Takada and H. Koike. MieLog: A highly interactive visual log browser using information visualization and statistical analysis. In Systems Administration Conference, pages 133-144, 2002.
-
(2002)
Systems Administration Conference
, pp. 133-144
-
-
Takada, T.1
Koike, H.2
-
23
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin. Intrusion detection by machine learning: A review. Expert Systems with Applications, 36:11995-12000, 2009.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 11995-12000
-
-
Tsai, C.-F.1
Hsu, Y.-F.2
Lin, C.-Y.3
Lin, W.-Y.4
-
24
-
-
84881042802
-
-
submission
-
VisWeek. Ieee vast challenge 2011 submission. http://hcil.cs.umd.edu/ localphp/hcil/vast11/index.php/submissions/index.
-
(2011)
Ieee Vast Challenge
-
-
-
26
-
-
79957613935
-
Network traffic monitoring, analysis and anomaly detection
-
W. Wang, X. Zhang, W. shi, S. Lian, and D. Feng. Network traffic monitoring, analysis and anomaly detection. IEEE Network, 25(3):6-7, 2011.
-
(2011)
IEEE Network
, vol.25
, Issue.3
, pp. 6-7
-
-
Wang, W.1
Zhang, X.2
Shi, W.3
Lian, S.4
Feng, D.5
|