Real-time and forensic network data analysis using animated and coordinated visualization

S Krasser, G Conti, J Grizzard… - … from the Sixth …, 2005 - ieeexplore.ieee.org
Rapidly detecting and classifying malicious activity contained within network traffic is a
challenging problem exacerbated by large datasets and functionally limited manual analysis …

Configuration based workflow composition

P Albert, L Henocque, M Kleiner - … International Conference on …, 2005 - ieeexplore.ieee.org
Automatic or assisted workflow composition is a field of intense research for applications to
the World Wide Web or to business process modeling. Workflow composition is traditionally …

[图书][B] Measuring the effectiveness of visual analytics and data fusion techniques on situation awareness in cyber-security

NA Giacobe - 2013 - search.proquest.com
Cyber-security involves the monitoring a complex network of inter-related computers to
prevent, identify and remediate from undesired actions. This work is performed in …

Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection

I Seo, H Lee, SC Han - computers & security, 2014 - Elsevier
The botnets are one of the most dangerous species of network-based attack. They cause
severe network disruptions through massive coordinated attacks nowadays and the results …

시각화기반의효율적인네트워크보안상황분석방법

정치윤, 손선경, 장범환, 나중찬 - 정보보호학회논문지, 2009 - dbpia.co.kr
네트워크 관리자가 침입 탐지 시스템, 방화벽 등의 보안 장비에서 발생하는 경보 메시지를
통하여 네트워크에서 이상 현상이 발생하였는지를 인지하고, 이상 현상이 실제 네트워크 보안 …

[PDF][PDF] An efficient method for analyzing network security situation using visualization

CY Jeong, SG Sohn, BH Chang… - Journal of the Korea …, 2009 - koreascience.kr
Network administrator recognizes the abnormal phenomenon in the managed network by
using the alert messages generated in the security devices including the intrusion detection …

[图书][B] Applying information visualization to computer security applications

RB Whitaker - 2010 - search.proquest.com
This thesis presents two phases of research in applying visualization to network security
challenges. The first phase included discovering the most useful and powerful features in …

[图书][B] Countering network-level denial of information attacks using information visualization

GJ Conti - 2006 - search.proquest.com
We are besieged with information every day, our inboxes overflow with spam and our search
queries return a great deal of irrelevant information. In most cases there is no malicious …

[图书][B] Network access control list situation awareness

A Reifers - 2010 - search.proquest.com
Network security is a large and complex problem being addressed by multiple communities.
Nevertheless, current theories in networking security appear to overestimate network …

Web-based three-dimension e-mail traffic visualization

X Wang, G Zhang - Advanced Web and Network Technologies, and …, 2006 - Springer
E-mail pervades many aspects of our lives and is becoming indispensable communication
method in areas such as commerce, government, production and general information …