共 32 条
[1]
Visualizing network data for intrusion detection
[J].
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP,
2005,
:100-108
[2]
Alshaikh Z, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P295, DOI 10.1109/ISI.2013.6578847
[3]
[Anonymous], 2003, INTRUSION DETECTION
[4]
[Anonymous], UNDERSTANDING INTRUS
[5]
[Anonymous], P 10 WORKSH VIS CYB
[6]
Colombe J.B., 2004, P 2004 ACM WORKSHOP, P138, DOI DOI 10.1145/1029208.1029231
[7]
Conti Greg., 2007, SECURITY DATA VISUAL
[8]
Dastani M, 2002, J VISUAL LANG COMPUT, V13, P601, DOI [10.1006/jvlc.2002.0235, 10.1006/S1045-926X(02)00026-5]
[9]
Designing visualization capabilities for IDS challenges
[J].
IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS,
2005,
:121-127
[10]
Heer J., 2005, CHI, P421, DOI 10.1145/1054972.1055031