共 20 条
- [1] [Anonymous], 2004, P 2004 ACM WORKSH VI, DOI DOI 10.1145/1029208.1029220
- [2] Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries [J]. IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, : 83 - 90
- [4] Conti G., 2004, VIZSEC DMSEC 04, P45
- [5] Conti Gregory, 2005, P 2005 S US PRIV SEC, P89, DOI DOI 10.1145/1073001.1073010
- [6] GATES C, 2006, CMUSEI2006TR005
- [7] Flow based observations from NETI@home and honeynet data [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 244 - 251
- [9] LBNL/ICSI, ENT TRAC PROJ
- [10] A visualization methodology for characterization of network scans [J]. IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, : 29 - 38