A Dynamic Three-Dimensional Network Visualization Program for Integration into CyberCIEGE and Other Network Visualization Scenarios
暂无分享,去创建一个
[1] V. Rao Vemuri,et al. Detecting And Visualizing Denial-of-Service And Network Probe Attacks Using Principal Component Analysis , 2005 .
[2] Xiaohong Yuan,et al. LAN attacker: a visual education tool , 2006, InfoSecCD '06.
[3] Allan R. Wilks,et al. Visualizing Network Data , 1995, IEEE Trans. Vis. Comput. Graph..
[4] Qiang Chen,et al. Probabilistic techniques for intrusion detection based on computer audit data , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[5] Clifford Berg. High-Assurance Design: Architecting Secure and Reliable Enterprise Applications , 2005 .
[6] T. Tidwell,et al. Modeling Internet Attacks , 2022 .
[7] George Kesidis,et al. Visual toolkit for network security experiment specification and data analysis , 2006, VizSEC '06.
[8] Aaron Kershenbaum,et al. Visualization of network structures , 2005 .
[9] Allan R. Wilks,et al. Dynamic graphics for network visualization , 1990, Proceedings of the First IEEE Conference on Visualization: Visualization `90.
[10] Kenneth C. Cox,et al. 3D geographic network displays , 1996, SGMD.
[11] Peter R. Keller,et al. Visual cues - practical data visualization , 1993 .
[12] Deborah Estrin,et al. Network Visualization with Nam, the VINT Network Animator , 2000, Computer.
[13] Kofi Nyarko,et al. Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration , 2002, Proceedings 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems. HAPTICS 2002.
[14] H. Gardner,et al. Frames of Mind: The Theory of Multiple Intelligences , 1983 .
[15] Ewan D. Tempero,et al. A framework for interactive web-based visualization , 2006, AUIC.
[16] Robert F. Erbacher. Glyph-based generic network visualization , 2002, IS&T/SPIE Electronic Imaging.
[17] Hyogon Kim,et al. Real-time visualization of network attacks on high-speed links , 2004, IEEE Network.
[18] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[19] John Hale,et al. A systematic approach to multi-stage network attack analysis , 2004, Second IEEE International Information Assurance Workshop, 2004. Proceedings..
[20] Christopher Leckie,et al. Efficient visualization of large routing topologies , 2004 .
[21] Cynthia E. Irvine,et al. Cyber Security Training and Awareness Through Game Play , 2006, SEC.
[22] Ganesh S. Oak. Information Visualization Introduction , 2022 .
[23] Graham J. Wills,et al. Navigating large networks with hierarchies , 1993, Proceedings Visualization '93.
[24] Stephen G. Eick,et al. Aspects of network visualization , 1996, IEEE Computer Graphics and Applications.
[25] Shigeyuki Matsuda,et al. Tracing Network Attacks to Their Sources , 2002, IEEE Internet Comput..
[26] Bernd Meyer,et al. Self-Organizing Graphs - A Neural Network Perspective of Graph Layout , 1998, GD.