메뉴 건너뛰기




Volumn , Issue , 2012, Pages 16-23

Crucial nodes centric visual monitoring and analysis of computer networks

Author keywords

crucial node; Network events monitoring; network visualization; security visualization

Indexed keywords

DATA VISUALIZATION; MONITORING; UNCERTAINTY ANALYSIS; VISUALIZATION;

EID: 84881081209     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CyberSecurity.2012.9     Document Type: Conference Paper
Times cited : (3)

References (27)
  • 2
    • 62249168871 scopus 로고    scopus 로고
    • A hybrid intrusion detection system design for computer network security
    • M. A. Aydin, A. H. Zaim, and K. Gkhan Ceylan. A hybrid intrusion detection system design for computer network security. Computers and Electrical Engineering, 35(1):517-526, 2009.
    • (2009) Computers and Electrical Engineering , vol.35 , Issue.1 , pp. 517-526
    • Aydin, M.A.1    Zaim, A.H.2    Ceylan, K.G.3
  • 6
    • 78149232727 scopus 로고    scopus 로고
    • Uncovering strengths and weaknesses of radial visualizations-an empirical approach
    • S. Diehl, F. Beck, and M. Burch. Uncovering strengths and weaknesses of radial visualizations-an empirical approach. IEEE Transactions on Visualization and Computer Graphics, 16(6):935-942, 2010.
    • (2010) IEEE Transactions on Visualization and Computer Graphics , vol.16 , Issue.6 , pp. 935-942
    • Diehl, S.1    Beck, F.2    Burch, M.3
  • 12
    • 38149004399 scopus 로고    scopus 로고
    • A scalable aural-visual environment for security event monitoring, analysis and response
    • P. Z. Kolano. A scalable aural-visual environment for security event monitoring, analysis and response. In International conference on Advances in visual computing, pages 564-575, 2007.
    • (2007) International Conference on Advances in Visual Computing , pp. 564-575
    • Kolano, P.Z.1
  • 16
    • 57649227949 scopus 로고    scopus 로고
    • chapter 5, Addison-Wesley Professional
    • R. Marty. Applied Security Visualization, chapter 5, pages 161-237. Addison-Wesley Professional, 2008.
    • (2008) Applied Security Visualization , pp. 161-237
    • Marty, R.1
  • 21
    • 85094574423 scopus 로고    scopus 로고
    • MieLog: A highly interactive visual log browser using information visualization and statistical analysis
    • T. Takada and H. Koike. MieLog: A highly interactive visual log browser using information visualization and statistical analysis. In Systems Administration Conference, pages 133-144, 2002.
    • (2002) Systems Administration Conference , pp. 133-144
    • Takada, T.1    Koike, H.2
  • 24
    • 84881042802 scopus 로고    scopus 로고
    • submission
    • VisWeek. Ieee vast challenge 2011 submission. http://hcil.cs.umd.edu/ localphp/hcil/vast11/index.php/submissions/index.
    • (2011) Ieee Vast Challenge
  • 26
    • 79957613935 scopus 로고    scopus 로고
    • Network traffic monitoring, analysis and anomaly detection
    • W. Wang, X. Zhang, W. shi, S. Lian, and D. Feng. Network traffic monitoring, analysis and anomaly detection. IEEE Network, 25(3):6-7, 2011.
    • (2011) IEEE Network , vol.25 , Issue.3 , pp. 6-7
    • Wang, W.1    Zhang, X.2    Shi, W.3    Lian, S.4    Feng, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.