共 21 条
- [1] Lu L.F., Zhang J.W., Sun J.Z., He P.L., Sun L.G., Survey of network security visualization techniques, Journal of Computer Applications, 28, 8, pp. 1924-1927, (2008)
- [2] Harrison L., Lu A.D., The future of security visualization: Lessons from network visualization, IEEE Network, 26, 6, pp. 6-11, (2012)
- [3] Zhang Y.P., Xiao Y., Chen M., Zhang J.Y., Deng H.M., A survey of security visualization for computer network logs, Security & Communication Networks, 5, 4, pp. 404-421, (2012)
- [4] Shiravi H., Shiravi A., Ghorbani A.A., A survey of visualization systems for network security, IEEE Trans. on Visualization and Computer Graphics, 18, 8, pp. 1313-1329, (2012)
- [5] Zhao Y., Fan X.P., Zhou F.F., Wang F., Zhang J.W., A survey on network security data visualization, Journal of Computer-Aided Design & Computer Graphics, 26, 5, pp. 687-697, (2014)
- [6] Abdullah K., Lee C., Conti G., Copeland J.A., Visualizing network data for intrusion detection, Proc. of the 6th Annual IEEE SMC Information Assurance Workshop, pp. 100-108, (2005)
- [7] Yegneswaran V., Barford P., Ullrich J., Internet intrusions: Global characteristics and prevalence, Proc. of the 2003 ACM SIGMETRICS Int'l Conf. on Measurement and Modeling of Computer Systems, pp. 138-147, (2003)
- [8] Zhao Y., Liang X., Fan X.P., Wang Y.W., Yang M.J., Zhou F.F., MVSec: Multi-Perspective and deductive visual analytics on heterogeneous network security data, Journal of Visualization, 17, 3, pp. 181-196, (2014)
- [9] Berthier R., Cukier M., Hiltunen M., Kormann D., Vesonder G., Sheleheda D., Nfsight: Netflow-Based network awareness tool, Proc. of the 24th Int'l Conf. on Large Installation System Administration, pp. 1-8, (2010)
- [10] Taylor T., Paterson D., Glanfield J., Gates C., Brooks S., Mchugh J., Flovis: Flow visualization system, Proc. of the Conf. for Homeland Security, pp. 186-198, (2009)