共 20 条
[1]
[Anonymous], 2004, P 2004 ACM WORKSH VI, DOI DOI 10.1145/1029208.1029220
[2]
Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries
[J].
IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS,
2005,
:83-90
[4]
Conti G., 2004, VIZSEC DMSEC 04, P45
[5]
Conti Gregory, 2005, P 2005 S US PRIV SEC, P89, DOI DOI 10.1145/1073001.1073010
[6]
GATES C, 2006, CMUSEI2006TR005
[7]
Flow based observations from NETI@home and honeynet data
[J].
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP,
2005,
:244-251
[9]
LBNL/ICSI, ENT TRAC PROJ
[10]
A visualization methodology for characterization of network scans
[J].
IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS,
2005,
:29-38