Real-time and forensic network data analysis using animated and coordinated visualization
Rapidly detecting and classifying malicious activity contained within network traffic is a
challenging problem exacerbated by large datasets and functionally limited manual analysis …
challenging problem exacerbated by large datasets and functionally limited manual analysis …
Configuration based workflow composition
Automatic or assisted workflow composition is a field of intense research for applications to
the World Wide Web or to business process modeling. Workflow composition is traditionally …
the World Wide Web or to business process modeling. Workflow composition is traditionally …
[图书][B] Measuring the effectiveness of visual analytics and data fusion techniques on situation awareness in cyber-security
NA Giacobe - 2013 - search.proquest.com
Cyber-security involves the monitoring a complex network of inter-related computers to
prevent, identify and remediate from undesired actions. This work is performed in …
prevent, identify and remediate from undesired actions. This work is performed in …
Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection
I Seo, H Lee, SC Han - computers & security, 2014 - Elsevier
The botnets are one of the most dangerous species of network-based attack. They cause
severe network disruptions through massive coordinated attacks nowadays and the results …
severe network disruptions through massive coordinated attacks nowadays and the results …
시각화기반의효율적인네트워크보안상황분석방법
정치윤, 손선경, 장범환, 나중찬 - 정보보호학회논문지, 2009 - dbpia.co.kr
네트워크 관리자가 침입 탐지 시스템, 방화벽 등의 보안 장비에서 발생하는 경보 메시지를
통하여 네트워크에서 이상 현상이 발생하였는지를 인지하고, 이상 현상이 실제 네트워크 보안 …
통하여 네트워크에서 이상 현상이 발생하였는지를 인지하고, 이상 현상이 실제 네트워크 보안 …
[PDF][PDF] An efficient method for analyzing network security situation using visualization
CY Jeong, SG Sohn, BH Chang… - Journal of the Korea …, 2009 - koreascience.kr
Network administrator recognizes the abnormal phenomenon in the managed network by
using the alert messages generated in the security devices including the intrusion detection …
using the alert messages generated in the security devices including the intrusion detection …
[图书][B] Applying information visualization to computer security applications
RB Whitaker - 2010 - search.proquest.com
This thesis presents two phases of research in applying visualization to network security
challenges. The first phase included discovering the most useful and powerful features in …
challenges. The first phase included discovering the most useful and powerful features in …
[图书][B] Countering network-level denial of information attacks using information visualization
GJ Conti - 2006 - search.proquest.com
We are besieged with information every day, our inboxes overflow with spam and our search
queries return a great deal of irrelevant information. In most cases there is no malicious …
queries return a great deal of irrelevant information. In most cases there is no malicious …
[图书][B] Network access control list situation awareness
A Reifers - 2010 - search.proquest.com
Network security is a large and complex problem being addressed by multiple communities.
Nevertheless, current theories in networking security appear to overestimate network …
Nevertheless, current theories in networking security appear to overestimate network …
Web-based three-dimension e-mail traffic visualization
X Wang, G Zhang - Advanced Web and Network Technologies, and …, 2006 - Springer
E-mail pervades many aspects of our lives and is becoming indispensable communication
method in areas such as commerce, government, production and general information …
method in areas such as commerce, government, production and general information …