A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques
暂无分享,去创建一个
[1] Robert F. Erbacher,et al. MULTI-NODE MONITORING AND INTRUSION DETECTION , 2022 .
[2] Deborah A. Frincke,et al. Intrusion and Misuse Detection in Large-Scale Systems , 2002, IEEE Computer Graphics and Applications.
[3] Robert F. Erbacher,et al. Visual Behavior Characterization for Intrusion Detection in Large Scale Systems , 2001, VIIP.
[4] Stefan Axelsson. Visualisation for Intrusion Detection , 2003, ESORICS.
[5] David S. Ebert,et al. Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection , 2001, VisSym.
[6] Gregory Stephens,et al. Statistical profiling and visualization for detection of malicious insider attacks on computer networks , 2004, VizSEC/DMSEC '04.
[7] Stefan Axelsson. Visualisation for Intrusion Detection Hooking the Worm , 2003 .
[8] Wayne G. Lutters,et al. An Information Visualization Framework for Intrusion Detection , 2004, CHI EA '04.
[9] Kwan-Liu Ma,et al. PortVis: a tool for port-based detection of security events , 2004, VizSEC/DMSEC '04.
[10] Tetsuji Takada,et al. MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis , 2002, LISA.
[11] Kwan-Liu Ma,et al. Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP , 2004, VizSEC/DMSEC '04.
[12] Dominique Brodbeck,et al. A Visual Approach for Monitoring Logs , 1998, LISA.
[13] William Yurcik,et al. A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[14] Oliver Niggemann,et al. Supporting Intrusion Detection by Graph Clustering and Graph Drawing , 2000 .
[15] Mike E. Davies,et al. International Conference on Visualization, Imaging and Image Processing , 2003 .
[16] Stefan Axelsson,et al. Visualising the Inner Workings of a Self Learning Classifier: Improving the Usability of Intrusion Detection Systems∗ , 2004 .
[17] Hideki Koike,et al. SnortView: visualization system of snort logs , 2004, VizSEC/DMSEC '04.
[18] Kwan-Liu Ma,et al. A visualization methodology for characterization of network scans , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[19] Thomas Goldring. Scatter (and other) plots for visualizing user profiling data and network traffic , 2004, VizSEC/DMSEC '04.
[20] Philip K. Chan,et al. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , 2004, CCS 2004.
[21] InSeon Yoo,et al. Visualizing windows executable viruses using self-organizing maps , 2004, VizSEC/DMSEC '04.
[22] Yifan Li,et al. VisFlowConnect: netflow visualizations of link relationships for security situational awareness , 2004, VizSEC/DMSEC '04.
[23] Stefan Axelsson,et al. Combining a bayesian classifier with visualisation: understanding the IDS , 2004, VizSEC/DMSEC '04.
[24] Stefan Axelsson. Visualising Intrusions: Watching the Webserver , 2004, SEC.
[25] Khaled Labib,et al. NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps , 2002 .
[26] Prasert Kanthamanon,et al. Hybrid Neural Networks for Intrusion Detection System , 2002 .
[27] Julie A. Dickerson,et al. Fuzzy feature extraction and visualization for intrusion detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[28] Chris North,et al. Home-centric visualization of network traffic for security administration , 2004, VizSEC/DMSEC '04.
[29] Kofi Nyarko,et al. Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration , 2002, Proceedings 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems. HAPTICS 2002.
[30] Kwan-Liu Ma,et al. A Visual Technique for Internet Anomaly Detection , 2002 .
[31] Kulsoom Abdullah,et al. Passive visual fingerprinting of network attack tools , 2004, VizSEC/DMSEC '04.