Threat Management Dashboard for a Blockchain Collaborative Defense
暂无分享,去创建一个
[1] Diane Staheli,et al. BubbleNet: A Cyber Security Dashboard for Visualizing Patterns , 2016, Comput. Graph. Forum.
[2] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[3] Lane Harrison,et al. Visualization evaluation for cyber security: trends and future directions , 2014, VizSEC.
[4] John Yen,et al. Cyber SA: Situational Awareness for Cyber Defense , 2010, Cyber Situational Awareness.
[5] Ken-ichi Sato,et al. Optical Transmission Systems and Equipment for WDM Networking IV , 2002 .
[6] Burkhard Stiller,et al. Enabling a Cooperative, Multi-domain DDoS Defense by a Blockchain Signaling System (BloSS) , 2017, LCN 2017.
[7] Andrew Odlyzko,et al. Internet traffic growth: sources and implications , 2003, SPIE ITCom.
[8] Ryan K. L. Ko,et al. A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[9] David Hausheer,et al. A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts , 2017, AIMS.
[10] Burkhard Stiller,et al. Security Management and Visualization in a Blockchain-based Collaborative Defense , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[11] Fabian Fagerholm,et al. How does Kanban impact communication and collaboration in software engineering teams? , 2013, 2013 6th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE).
[12] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[13] Jelena Mirkovic,et al. A Framework for a Collaborative DDoS Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[14] Burkhard Stiller,et al. Toward Mitigation-as-a-Service in Cooperative Network Defenses , 2018, 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[15] Lin Yang,et al. Network Security Situation Awareness Method Based on Visualization , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[16] Raffael Marty,et al. Applied Security Visualization , 2008 .
[17] Christopher G. Healey,et al. Ensemble visualization for cyber situation awareness of network security data , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).
[18] Juan Benet,et al. IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.
[19] Dennis Gamayunov,et al. Visualization of complex attacks and state of attacked network , 2009, 2009 6th International Workshop on Visualization for Cyber Security.