找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: VizSEC 2007; Proceedings of the W John R. Goodall,Gregory Conti,Kwan-Liu Ma Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 2

[復(fù)制鏈接]
樓主: 嚴(yán)峻
21#
發(fā)表于 2025-3-25 04:36:30 | 只看該作者
VisAlert: From Idea to Product,detection and prevention. VisAlert facilitates and promotes situational awareness in complex network environments by providing the user with a holistic view of network security to aid in the detection of sophisticated and malicious activities, and ability to zoom in-out information of interest. The
22#
發(fā)表于 2025-3-25 08:34:42 | 只看該作者
Visually Understanding Jam Resistant Communication,ften relegated to a discussion of denial of service attacks on network resources. Another form of denying availability is to prevent communication through the use of traditional jamming techniques. At the United States Air Force Academy Center for Information Security, we have been working on a new
23#
發(fā)表于 2025-3-25 14:07:57 | 只看該作者
24#
發(fā)表于 2025-3-25 18:23:44 | 只看該作者
25#
發(fā)表于 2025-3-25 20:52:11 | 只看該作者
An Interactive Attack Graph Cascade and Reachability Display,lification, current attack graph displays are complex and difficult to relate to the underlying physical networks. We have developed a new interactive tool intended to provide a simplified and more intuitive understanding of key weaknesses discovered by attack graph analysis. Separate treemaps are u
26#
發(fā)表于 2025-3-26 04:10:01 | 只看該作者
Intelligent Classification and Visualization of Network Scans,al to analyze these network scans. Statistical methods such as wavelet scalogram analysis have been used along with visualization techniques in previous methods. However, applying these statistical methods causes a substantial amount of data loss. This paper presents a study of using associative mem
27#
發(fā)表于 2025-3-26 04:58:52 | 只看該作者
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope,affic and identify incidents of scan activity. Some of the identified phenomena appear to be novel forms of host discovery. Scan detection algorithms used by the Snort and Bro intrusion detection systems are critiqued by comparing the visualised scans with alert output. Where human assessment disagr
28#
發(fā)表于 2025-3-26 09:59:34 | 只看該作者
29#
發(fā)表于 2025-3-26 15:22:11 | 只看該作者
30#
發(fā)表于 2025-3-26 17:37:12 | 只看該作者
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective,h to give more details about the network and allow interactive controls for an administrator to actively monitor a network in order to react to security events quickly. Our resulting visualizations of networks successfully identified and described denial of service (DoS) and compromised network attacks.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 00:49
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
新邵县| 东乡| 和龙市| 枝江市| 吕梁市| 蓬溪县| 白沙| 西盟| 怀来县| 沽源县| 日土县| 泽库县| 朝阳区| 琼中| 茶陵县| 西华县| 永春县| 太仓市| 宝山区| 普兰店市| 定南县| 庐江县| 闵行区| 白水县| 慈溪市| 卢龙县| 沂水县| 忻州市| 花垣县| 历史| 和平区| 宁德市| 澄城县| 潞西市| 新昌县| 杭锦后旗| 资中县| 平阴县| 建平县| 河间市| 克拉玛依市|