Security visualization: Cyber security storm map and event correlation
暂无分享,去创建一个
Chase Qishi Wu | Dipankar Dasgupta | Michael Schmidt | Denise Ferebee | D. Dasgupta | C. Wu | D. Ferebee | Michael Schmidt
[1] Tom Carey,et al. ACM SIGCHI Curricula for Human-Computer Interaction , 1992 .
[2] M. Bouaziz,et al. An Introduction to Computer Security , 2012 .
[3] Chase Qishi Wu,et al. Monitoring security events using integrated correlation-based techniques , 2009, CSIIRW '09.
[4] Colin Ware,et al. Information Visualization: Perception for Design , 2000 .
[5] Chase Qishi Wu,et al. An integrated cyber security monitoring system using correlation-based techniques , 2009, 2009 IEEE International Conference on System of Systems Engineering (SoSE).
[6] Keith Nesbitt,et al. Using Guidelines to assist in the Visualisation Design Process , 2005, APVIS.
[7] Patrick Hertzog. Visualizations to improve reactivity towards security incidents inside corporate networks , 2006, VizSEC '06.
[8] Chase Qishi Wu,et al. Visualization of security events using an efficient correlation technique , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.
[9] Sushil Jajodia,et al. Advanced Cyber Attack Modeling Analysis and Visualization , 2010 .
[10] Daniel A. Keim,et al. Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations , 2009, CHIMIT.
[11] M. Petró‐Turza,et al. The International Organization for Standardization. , 2003 .
[12] Raffael Marty,et al. Applied Security Visualization , 2008 .
[13] Stefano Foresti,et al. Visual correlation of network alerts , 2006, IEEE Computer Graphics and Applications.