Server sounds and network noises
暂无分享,去创建一个
[1] John R. Goodall,et al. Introduction to Visualization for Computer Security , 2007, VizSEC.
[2] Hiroyuki Ohno,et al. Design and Implementation of Stetho: Network Sonificiation System , 2002, ICMC.
[3] Tobias Hildebrandt. Towards Enhancing Business Process Monitoring with Sonification , 2013 .
[4] Arthur Edwards Block,et al. Auditory Display as a Tool for Teaching Network Intrusion Detection , 2007, Int. J. Emerg. Technol. Learn..
[5] Miguel A. Garcia-Ruiz,et al. Towards a Multimodal Human-Computer Interface to Analyze Intrusion Detection in Computer Networks , 2006 .
[6] Alberto Negro,et al. NeMoS: Network monitoring with sound , 2003 .
[7] Greg Conti. Security data visualization , 2007 .
[8] Mta Sztaki,et al. Overview of Auditory Representations in Human-Machine Interfaces , 2013 .
[9] Ali A. Ghorbani,et al. A Survey of Visualization Systems for Network Security , 2012, IEEE Transactions on Visualization and Computer Graphics.
[10] Paul Vickers,et al. Network Situational Awareness: Sonification and Visualization in the Cyber Battlespace , 2014 .
[11] Paul Vickers,et al. Sonification of a network's self-organized criticality for real-time situational awareness , 2014, Displays.
[12] Chris Schmandt,et al. "LISTENIN" TO DOMESTIC ENVIRONMENTS FROM REMOTE LOCATIONS , 2003 .
[13] John G. Neuhoff,et al. Sonification Report: Status of the Field and Research Agenda Prepared for the National Science Foundation by members of the International Community for Auditory Display , 1999 .
[14] Alva L. Couch,et al. Peep (The Network Auralizer): Monitoring Your Network with Sound , 2000, LISA.
[15] Umberto Ferraro Petrillo,et al. Multimodal Monitoring of Web Server , 2002, IEEE Multim..
[16] Philip E. Varner,et al. Monitoring and Visualization of Emergent Behavior in Large Scale Intrusion Tolerant Distributed Systems , .
[17] M. I. T. Media Lab,et al. “ LISTENIN ” TO DOMESTIC ENVIRONMENTS FROM REMOTE LOCATIONS , 2003 .
[18] Stefanie Rinderle-Ma,et al. A sonification system for process monitoring as secondary task , 2014, 2014 5th IEEE Conference on Cognitive Infocommunications (CogInfoCom).
[19] Rudi Giot,et al. InteNtion – Interactive Network Sonification , 2012 .
[20] David L. Hall,et al. Preliminary Steps in Sonifying Web Log Data , 2010 .
[21] Greg,et al. Security data visualization : graphical techniques for network analysis , 2007 .
[22] Katharina Vogt,et al. Sonification of a streaming-server logfile , 2015, ICAD.
[23] Bill Kapralos,et al. Toward Sound-Assisted Intrusion Detection Systems , 2007, OTM Conferences.
[24] William W. Gaver,et al. Effective sounds in complex systems: the ARKOLA simulation , 1991, CHI.
[25] Alexander A. Sawchuk,et al. CyberSeer: 3D audio-visual immersion for network security and management , 2004, VizSEC/DMSEC '04.
[26] John C. Knight,et al. Security Monitoring, Visualization, and System Survivability: A Position Paper for ISW-2001 , 2001 .
[27] Nicklaus A. Giacobe,et al. Songs of cyberspace: an update on sonifications of network traffic to support situational awareness , 2011, Defense + Commercial Sensing.
[28] Jean Vanderdonckt,et al. A Method to Design Information Security Feedback Using Patterns and HCI-Security Criteria , 2008, CADUI.
[29] David L. Hall,et al. Do you see what I hear: experiments in multi-channel sound and 3D visualization for network monitoring? , 2010, Defense + Commercial Sensing.
[30] B. Kapralos,et al. Poster : Towards Music-Assisted Intrusion Detection , 2009 .
[31] Paul Vickers,et al. Sonification for Process Monitoring , 2011 .
[32] David Worrall. Realtime sonification and visualisation of network metadata , 2015 .