Data mining-based integrated network traffic visualization framework for threat detection
暂无分享,去创建一个
[1] Chris North,et al. Home-centric visualization of network traffic for security administration , 2004, VizSEC/DMSEC '04.
[2] Deborah Estrin,et al. Network Visualization with Nam, the VINT Network Animator , 2000, Computer.
[3] Chris North,et al. Visual correlation of host processes and network traffic , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[4] Christopher Westphal. Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies , 2008 .
[5] Jill Slay,et al. The "Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation , 2010, 2010 International Conference on Availability, Reliability and Security.
[6] Ehab Al-Shaer,et al. Analysis of Firewall Policy Rules Using Data Mining Techniques , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[7] William Yurcik,et al. NVisionIP: netflow visualizations of system state for security situational awareness , 2004, VizSEC/DMSEC '04.
[8] Bianchi Serique Meiguins,et al. PRISMA - A Multidimensional Information Visualization Tool Using Multiple Coordinated Views , 2007, 2007 11th International Conference Information Visualization (IV '07).
[9] Edward Swing. Flodar: Flow Visualization of Network Traffic , 1998, IEEE Computer Graphics and Applications.
[10] John R. Goodall,et al. VIAssist: Visual analytics for cyber defense , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[11] Cristian Estan,et al. Interactive Traffic Analysis and Visualization with Wisconsin Netpy , 2005, LISA.
[12] Iftikhar Ahmad,et al. Application of artificial neural network in detection of probing attacks , 2009, 2009 IEEE Symposium on Industrial Electronics & Applications.
[13] Yifan Li,et al. VisFlowConnect: netflow visualizations of link relationships for security situational awareness , 2004, VizSEC/DMSEC '04.
[14] A. L. Narasimha Reddy,et al. NetViewer: A Network Traffic Visualization and Analysis Tool , 2005, LISA.
[15] John T. Stasko,et al. IDS rainStorm: visualizing IDS alarms , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[16] John McHugh,et al. FloVis: Flow Visualization System , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[17] Manish Karir,et al. Flamingo: Visualizing Internet Traffic , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[18] Barry Irwin,et al. InetVis, a visual tool for network telescope traffic analysis , 2006, AFRIGRAPH '06.
[19] Ben Shneiderman,et al. The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.
[20] Sadie Creese,et al. CyberVis: Visualizing the potential impact of cyber attacks on the wider enterprise , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[22] Mayank Pal Singh,et al. Visualization of flow data based on clustering technique for identifying network anomalies , 2009, 2009 IEEE Symposium on Industrial Electronics & Applications.
[23] Mao Lin Huang,et al. A new concentric-circle visualization of multi-dimensional data and its application in network security , 2010, J. Vis. Lang. Comput..
[24] Colin Ware,et al. Information Visualization: Perception for Design , 2000 .
[25] Zhang Jiawan,et al. A Novel Visualization Approach for Efficient Network Scans Detection , 2008, 2008 International Conference on Security Technology.
[26] Risto Vaarandi. Real-time classification of IDS alerts with data mining techniques , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.