BURN: baring unknown rogue networks
暂无分享,去创建一个
Stefano Zanero | Federico Maggi | Paolo Ciuccarelli | Giorgio Caviglia | Francesco Roveta | Luca Di Mario | S. Zanero | F. Maggi | G. Caviglia | P. Ciuccarelli | Francesco Roveta | L. D. Mario
[1] A. Robinson. Elements of Cartography , 1953 .
[2] Koji Nakao,et al. An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques , 2008, ICONIP.
[3] Raffael Marty,et al. Applied Security Visualization , 2008 .
[4] Robert Kosara,et al. Beyond Bertin: Seeing the Forest despite the Trees , 2010, IEEE Computer Graphics and Applications.
[5] Paolo Ciuccarelli,et al. From Data to Knowledge - Visualizations as Transformation Processes within the Data-Information-Knowledge Continuum , 2010, 2010 14th International Conference Information Visualisation.
[6] Richard Lippmann,et al. EMBER: a global perspective on extreme malicious behavior , 2010, VizSec '10.
[7] Lane Harrison,et al. Interactive detection of network anomalies via coordinated multiple views , 2010, VizSec '10.
[8] Evangelos P. Markatos,et al. Experiences and Observations from the NoAH Infrastructure , 2010, 2010 European Conference on Computer Network Defense.
[9] Kevin C. Almeroth,et al. FIRE: FInding Rogue nEtworks , 2009, 2009 Annual Computer Security Applications Conference.