找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: VizSEC 2007; Proceedings of the W John R. Goodall,Gregory Conti,Kwan-Liu Ma Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 2

[復(fù)制鏈接]
樓主: 嚴(yán)峻
21#
發(fā)表于 2025-3-25 04:36:30 | 只看該作者
VisAlert: From Idea to Product,detection and prevention. VisAlert facilitates and promotes situational awareness in complex network environments by providing the user with a holistic view of network security to aid in the detection of sophisticated and malicious activities, and ability to zoom in-out information of interest. The
22#
發(fā)表于 2025-3-25 08:34:42 | 只看該作者
Visually Understanding Jam Resistant Communication,ften relegated to a discussion of denial of service attacks on network resources. Another form of denying availability is to prevent communication through the use of traditional jamming techniques. At the United States Air Force Academy Center for Information Security, we have been working on a new
23#
發(fā)表于 2025-3-25 14:07:57 | 只看該作者
24#
發(fā)表于 2025-3-25 18:23:44 | 只看該作者
25#
發(fā)表于 2025-3-25 20:52:11 | 只看該作者
An Interactive Attack Graph Cascade and Reachability Display,lification, current attack graph displays are complex and difficult to relate to the underlying physical networks. We have developed a new interactive tool intended to provide a simplified and more intuitive understanding of key weaknesses discovered by attack graph analysis. Separate treemaps are u
26#
發(fā)表于 2025-3-26 04:10:01 | 只看該作者
Intelligent Classification and Visualization of Network Scans,al to analyze these network scans. Statistical methods such as wavelet scalogram analysis have been used along with visualization techniques in previous methods. However, applying these statistical methods causes a substantial amount of data loss. This paper presents a study of using associative mem
27#
發(fā)表于 2025-3-26 04:58:52 | 只看該作者
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope,affic and identify incidents of scan activity. Some of the identified phenomena appear to be novel forms of host discovery. Scan detection algorithms used by the Snort and Bro intrusion detection systems are critiqued by comparing the visualised scans with alert output. Where human assessment disagr
28#
發(fā)表于 2025-3-26 09:59:34 | 只看該作者
29#
發(fā)表于 2025-3-26 15:22:11 | 只看該作者
30#
發(fā)表于 2025-3-26 17:37:12 | 只看該作者
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective,h to give more details about the network and allow interactive controls for an administrator to actively monitor a network in order to react to security events quickly. Our resulting visualizations of networks successfully identified and described denial of service (DoS) and compromised network attacks.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 00:49
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
广宁县| 讷河市| 望城县| 赫章县| 昌江| 策勒县| 来安县| 朔州市| 霍林郭勒市| 吴旗县| 竹溪县| 定日县| 凭祥市| 平舆县| 龙门县| 宜都市| 湟中县| 清流县| 德保县| 宣武区| 蒙阴县| 城固县| 巫山县| 孟连| 巨野县| 和静县| 肇州县| 张家界市| 山西省| 合作市| 鸡泽县| 岢岚县| 西丰县| 罗源县| 封丘县| 武穴市| 怀化市| 永济市| 翁牛特旗| 都昌县| 金乡县|