P3D: A parallel 3D coordinate visualization for advanced network scans
暂无分享,去创建一个
Raheem A. Beyah | Kulsoom Abdullah | John A. Copeland | A. Selcuk Uluagac | Troy Nunnally | Penyen Chi | R. Beyah | J. Copeland | A. Uluagac | K. Abdullah | Troy Nunnally | Penyen Chi
[1] Hideki Koike,et al. SnortView: visualization system of snort logs , 2004, VizSEC/DMSEC '04.
[2] D. Ghazanfarpour,et al. 3 D graph Visualization prototype system for Intrusion Detection : A surveillance aid to security analysts , 2006 .
[3] Jayant Gadge,et al. Port scan detection , 2008, 2008 16th IEEE International Conference on Networks.
[4] Lloyd G. Greenwald,et al. Tolerating adversaries in the estimation of network parameters from noisy data: A nonlinear filtering approach , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[5] Colin Ware,et al. Information Visualization: Perception for Design , 2000 .
[6] Helwig Hauser,et al. Angular brushing of extended parallel coordinates , 2002, IEEE Symposium on Information Visualization, 2002. INFOVIS 2002..
[7] Dirk Reiners,et al. Exploring three-dimensional visualization for intrusion detection , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[8] John McHugh,et al. NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior , 2007, VizSEC.
[9] Raheem A. Beyah,et al. 3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[10] John R. Goodall,et al. Visualization is better! A comparative evaluation , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[11] Heejo Lee,et al. Fast detection and visualization of network attacks on parallel coordinates , 2009, Comput. Secur..
[12] Andy Cockburn,et al. Revisiting 2D vs 3D Implications on Spatial Memory , 2004, AUIC.
[13] Alejandro Carvajal. Quantitative comparison between the use of 3D vs 2D visualization tools to present building design proposals to non-spatial skilled end users , 2005, Ninth International Conference on Information Visualisation (IV'05).
[14] Sindhu Kakuru. Behavior based network traffic analysis tool , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[15] Geoffrey S. Hubona,et al. The relative contributions of stereo, lighting, and background scenes in promoting 3D depth visualization , 1999, TCHI.
[16] John T. Stasko,et al. Attacking information visualization system usability overloading and deceiving the human , 2005, SOUPS '05.
[17] Daniel A. Keim,et al. Information Visualization and Visual Data Mining , 2002, IEEE Trans. Vis. Comput. Graph..
[18] Stephen Lau,et al. The Spinning Cube of Potential Doom , 2004, CACM.
[19] Zhang Jiawan,et al. A Novel Visualization Approach for Efficient Network Scans Detection , 2008, 2008 International Conference on Security Technology.
[20] Kwan-Liu Ma,et al. PortVis: a tool for port-based detection of security events , 2004, VizSEC/DMSEC '04.
[21] Kulsoom Abdullah,et al. Passive visual fingerprinting of network attack tools , 2004, VizSEC/DMSEC '04.