Visual firewall: real-time network security monitor
暂无分享,去创建一个
Raheem A. Beyah | John A. Copeland | Jason Trost | Christopher P. Lee | Nicholas Gibbs | R. Beyah | J. Copeland | Christopher P. Lee | J. Trost | Nicholas Gibbs
[1] Stephen Lau,et al. The Spinning Cube of Potential Doom , 2004, CACM.
[2] Deborah A. Frincke,et al. Intrusion and Misuse Detection in Large-Scale Systems , 2002, IEEE Computer Graphics and Applications.
[3] Tetsuji Takada,et al. MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis , 2002, LISA.
[4] Kulsoom Abdullah,et al. Passive visual fingerprinting of network attack tools , 2004, VizSEC/DMSEC '04.
[5] G. Conti,et al. Real-time and forensic network data analysis using animated and coordinated visualization , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[6] Kwan-Liu Ma. Visualization for security , 2004, COMG.
[7] Kwan-Liu Ma,et al. PortVis: a tool for port-based detection of security events , 2004, VizSEC/DMSEC '04.
[8] Hideki Koike,et al. SnortView: visualization system of snort logs , 2004, VizSEC/DMSEC '04.
[9] Chris North,et al. Home-centric visualization of network traffic for security administration , 2004, VizSEC/DMSEC '04.
[10] Robert F. Erbacher,et al. Intrusion behavior detection through visualization , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).