共 26 条
- [1] Barford P., 2016, IEEE SYM VIS CYB SEC, P1
- [2] Visual Analytics for BGP Monitoring and Prefix Hijacking Identification [J]. IEEE NETWORK, 2012, 26 (06): : 33 - 39
- [3] Camargo L. F., 2020, COMPUTATIONAL SCI IT, V12250, P44, DOI DOI 10.1007/978-3
- [5] Conti G., 2007, SECURITY DATA VISUAL, V1st, P105
- [6] Demchak Y., 2018, Military Cyber Affairs, The Journal of the Military Cyber Professionals Association, V3, P7
- [7] Douzet F, 2020, INT CONF CYBER CONFL, P157, DOI [10.23919/CyCon49761.2020.9131726, 10.23919/cycon49761.2020.9131726]
- [8] Fonseca P., 2019, IEEE S COMPUTERS COM, P1, DOI [10.1109/ISCC47284.2019. 8969619, DOI 10.1109/ISCC47284.2019.8969619]
- [9] Heinbockel W., 2016, P NATO IST 148 S CYB, P1
- [10] Knake R, 2020, CYBER WAR NEXT THREA