Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
暂无分享,去创建一个
Mikel Iturbe | Roberto Uribeetxeberria | Urko Zurutuza | Iñaki Garitano | Urko Zurutuza | Iñaki Garitano | Roberto Uribeetxeberria | Mikel Iturbe
[1] Jeffrey Heer,et al. D³ Data-Driven Documents , 2011, IEEE Transactions on Visualization and Computer Graphics.
[2] Steven J. M. Jones,et al. Circos: an information aesthetic for comparative genomics. , 2009, Genome research.
[3] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[4] Thomas Ertl,et al. OCEANS: online collaborative explorative analysis on network security , 2014, VizSec '14.
[5] Oliver Niggemann,et al. On Visual Analytics in Plant Monitoring , 2014 .
[6] Wei Zeng,et al. Visualizing Interchange Patterns in Massive Movement Data , 2013, Comput. Graph. Forum.
[7] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[8] Paul A. Watters,et al. Unsupervised authorship analysis of phishing webpages , 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT).
[9] Gerhard P Hancke,et al. Introduction to Industrial Control Networks , 2013, IEEE Communications Surveys & Tutorials.
[10] Aiko Pras,et al. Flow whitelisting in SCADA networks , 2013, Int. J. Crit. Infrastructure Prot..
[11] Kensuke Fukuda,et al. Visual comparison of network anomaly detectors with chord diagrams , 2014, SAC.
[12] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[13] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.