메뉴 건너뛰기




Volumn , Issue , 2008, Pages 203-220

Putting security in context: Visual correlation of network activity with real-world information

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXTUALIZATION; GEOPOLITICAL EVENTS; NETWORK ACTIVITIES; REAL-WORLD INFORMATION; SITUATIONAL AWARENESS; TEXTUAL INFORMATION; VISUAL CORRELATIONS; VISUALIZATION TOOLS;

EID: 84890913169     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 2
    • 84890943673 scopus 로고    scopus 로고
    • Chicago, University of Chicago
    • K Beals, G Cooke, D Kathman, et al. Chicago, University of Chicago 29:23-61.
    • , vol.29 , pp. 23-61
    • Beals, K.1    Cooke, G.2    Kathman, D.3
  • 3
    • 33645237139 scopus 로고    scopus 로고
    • Countering security information overload through alert and packet visualization
    • (March/April)
    • Conti G, Abdullah K, et al. (2006) Countering security information overload through alert and packet visualization. IEEE Computer Graphics and Applications (March/April):30-40.
    • (2006) IEEE Computer Graphics and Applications , pp. 30-40
    • Conti, G.1    Abdullah, K.2
  • 4
    • 27244444920 scopus 로고    scopus 로고
    • Using behavior knowledge space and temporal information for detecting intrusions in computer networks
    • Cordella LP, Finizio I, et al. (2005) Using behavior knowledge space and temporal information for detecting intrusions in computer networks. Pattern Recognition and Image Analysis, Pt 2, Proceedings 3687:94-102.
    • (2005) Pattern Recognition and Image Analysis, Pt 2, Proceedings , vol.3687 , pp. 94-102
    • Cordella, L.P.1    Finizio, I.2
  • 5
    • 84964413675 scopus 로고    scopus 로고
    • Methods of visualizing temporal patterns in and mission impact of computer security breaches
    • IEEE Computer Society
    • D'Amico A and Larkin M (2001) Methods of visualizing temporal patterns in and mission impact of computer security breaches. DARPA Information Survivability Conference and Exposition II, IEEE Computer Society.
    • (2001) DARPA Information Survivability Conference and Exposition II
    • D'amico, A.1    Larkin, M.2
  • 6
    • 0242414940 scopus 로고    scopus 로고
    • Intrusion and misuse detection in large-scale systems
    • Erbacher R, Walker K, et al. (2002) Intrusion and misuse detection in large-scale systems. Computer Graphics and Applications 22(1):38-48.
    • (2002) Computer Graphics and Applications , vol.22 , Issue.1 , pp. 38-48
    • Erbacher, R.1    Walker, K.2
  • 13
    • 33745456201 scopus 로고    scopus 로고
    • Real-time and forensic network data analysis using animated and coordinated visualization
    • West Point, NY
    • Krasser S, Conti G, et al. (2005) Real-time and forensic network data analysis using animated and coordinated visualization. IEEE Workshop of Information Assurance and Security, West Point, NY.
    • (2005) IEEE Workshop of Information Assurance and Security
    • Krasser, S.1    Conti, G.2
  • 16
    • 10744229450 scopus 로고    scopus 로고
    • Researchers develop network-security visualization tools
    • Paulson L (2004) Researchers develop network-security visualization tools. Computer 37(4): 17-18.
    • (2004) Computer , vol.37 , Issue.4 , pp. 17-18
    • Paulson, L.1
  • 20
    • 44349090241 scopus 로고    scopus 로고
    • Network intrusion detection cognitive task analysis: Textual and visual tool usage and recommendations
    • Thompson R, Rantanen E, et al. (2006) Network intrusion detection cognitive task analysis: Textual and visual tool usage and recommendations. Proceedings of the Human Factors and Ergonomics Society (HFES 06), pp. 669-673.
    • (2006) Proceedings of the Human Factors and Ergonomics Society (HFES 06 , pp. 669-673
    • Thompson, R.1    Rantanen, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.