找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: VizSEC 2007; Proceedings of the W John R. Goodall,Gregory Conti,Kwan-Liu Ma Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 2

[復制鏈接]
樓主: 嚴峻
21#
發(fā)表于 2025-3-25 04:36:30 | 只看該作者
VisAlert: From Idea to Product,detection and prevention. VisAlert facilitates and promotes situational awareness in complex network environments by providing the user with a holistic view of network security to aid in the detection of sophisticated and malicious activities, and ability to zoom in-out information of interest. The
22#
發(fā)表于 2025-3-25 08:34:42 | 只看該作者
Visually Understanding Jam Resistant Communication,ften relegated to a discussion of denial of service attacks on network resources. Another form of denying availability is to prevent communication through the use of traditional jamming techniques. At the United States Air Force Academy Center for Information Security, we have been working on a new
23#
發(fā)表于 2025-3-25 14:07:57 | 只看該作者
24#
發(fā)表于 2025-3-25 18:23:44 | 只看該作者
25#
發(fā)表于 2025-3-25 20:52:11 | 只看該作者
An Interactive Attack Graph Cascade and Reachability Display,lification, current attack graph displays are complex and difficult to relate to the underlying physical networks. We have developed a new interactive tool intended to provide a simplified and more intuitive understanding of key weaknesses discovered by attack graph analysis. Separate treemaps are u
26#
發(fā)表于 2025-3-26 04:10:01 | 只看該作者
Intelligent Classification and Visualization of Network Scans,al to analyze these network scans. Statistical methods such as wavelet scalogram analysis have been used along with visualization techniques in previous methods. However, applying these statistical methods causes a substantial amount of data loss. This paper presents a study of using associative mem
27#
發(fā)表于 2025-3-26 04:58:52 | 只看該作者
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope,affic and identify incidents of scan activity. Some of the identified phenomena appear to be novel forms of host discovery. Scan detection algorithms used by the Snort and Bro intrusion detection systems are critiqued by comparing the visualised scans with alert output. Where human assessment disagr
28#
發(fā)表于 2025-3-26 09:59:34 | 只看該作者
29#
發(fā)表于 2025-3-26 15:22:11 | 只看該作者
30#
發(fā)表于 2025-3-26 17:37:12 | 只看該作者
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective,h to give more details about the network and allow interactive controls for an administrator to actively monitor a network in order to react to security events quickly. Our resulting visualizations of networks successfully identified and described denial of service (DoS) and compromised network attacks.
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 15:20
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
新民市| 青阳县| 尉犁县| 玉门市| 从江县| 滁州市| 平遥县| 广宁县| 含山县| 逊克县| 武定县| 奉化市| 布尔津县| 昌图县| 八宿县| 镇赉县| 新余市| 凌海市| 色达县| 波密县| 沁源县| 克什克腾旗| 巨鹿县| 鱼台县| 大同市| 宁化县| 正安县| 高台县| 临西县| 香港 | 云龙县| 甘孜县| 门头沟区| 柏乡县| 台北市| 民勤县| 泸西县| 巫山县| 永顺县| 北宁市| 汉源县|