共 346 条
- [1] Abdullah K, 2005, IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, P1
- [2] Visualizing network data for intrusion detection [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 100 - 108
- [3] Abdullah K., 2006, P 3 INT WORKSH VIZSE, P61
- [4] Automatic construction of dynamic 3D metaphoric worlds: An application to network management [J]. VISUAL DATA EXPLORATION AND ANALYSIS VII, 2000, 3960 : 312 - 323
- [5] Abello J, 1999, COMPUT GRAPHICS-US, V33, P13, DOI 10.1145/330572.330576
- [6] Abuaitah G., 2009, P 6 INT WORKSH VIS C, P111
- [7] Improving Security Visualization with Exposure Map Filtering [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 205 - 214
- [8] A GRAPHICAL REPRESENTATION FOR NETWORK MANAGEMENT [J]. 14TH CONFERENCE ON LOCAL COMPUTER NETWORKS, 1989, : 106 - 124
- [9] [Anonymous], 2008, USING VISUALIZATION
- [10] [Anonymous], 2010, P 10 ACM SIGCOMM C I