共 346 条
[1]
Abdullah K, 2005, IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, P1
[2]
Visualizing network data for intrusion detection
[J].
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP,
2005,
:100-108
[3]
Abdullah K., 2006, P 3 INT WORKSH VIZSE, P61
[4]
Automatic construction of dynamic 3D metaphoric worlds: An application to network management
[J].
VISUAL DATA EXPLORATION AND ANALYSIS VII,
2000, 3960
:312-323
[5]
Abello J, 1999, COMPUT GRAPHICS-US, V33, P13, DOI 10.1145/330572.330576
[6]
Abuaitah G., 2009, P 6 INT WORKSH VIS C, P111
[7]
Improving Security Visualization with Exposure Map Filtering
[J].
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2008,
:205-214
[8]
A GRAPHICAL REPRESENTATION FOR NETWORK MANAGEMENT
[J].
14TH CONFERENCE ON LOCAL COMPUTER NETWORKS,
1989,
:106-124
[9]
[Anonymous], 2008, USING VISUALIZATION
[10]
[Anonymous], 2010, P 10 ACM SIGCOMM C I