Visualisation for Intrusion Detection Hooking the Worm
暂无分享,去创建一个
[1] Richard Braithwaite. The pubstro phenomenon : Robin Hoods of the internet , 2003 .
[2] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[3] Deborah A. Frincke,et al. Intrusion and Misuse Detection in Large-Scale Systems , 2002, IEEE Computer Graphics and Applications.
[4] Alfred Inselberg,et al. Multidimensional detective , 1997, Proceedings of VIZ '97: Visualization Conference, Information Visualization Symposium and Parallel Rendering Symposium.
[5] Charles P. Pfleeger,et al. Security in computing , 1988 .
[6] Ben Shneiderman,et al. Readings in information visualization - using vision to think , 1999 .
[7] Kwan-Liu Ma,et al. Case study: Interactive visualization for Internet security , 2002, IEEE Visualization, 2002. VIS 2002..
[8] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[9] D. Frincke,et al. A Visual Mathematical Model for Intrusion Detection , 1998 .
[10] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.