[图书][B] Applied security visualization

R Marty - 2008 - dl.acm.org
APPLIED SECURITY VISUALIZATION Collecting log data is one thing, having relevant
information is something else. The art to transform all kinds of log data into meaningful …

[图书][B] Security data visualization: graphical techniques for network analysis

G Conti - 2007 - books.google.com
Information overload. If you're responsible for maintaining your network's security, you're
living with it every day. Logs, alerts, packet captures, and even binary files take time and …

A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

[图书][B] Data-driven security: analysis, visualization and dashboards

J Jacobs, B Rudis - 2014 - books.google.com
Uncover hidden patterns of data and respond with countermeasures Security professionals
need all the tools at their disposal to increase their visibility in order to prevent security …

Home-centric visualization of network traffic for security administration

R Ball, GA Fink, C North - Proceedings of the 2004 ACM workshop on …, 2004 - dl.acm.org
Today's system administrators, burdened by rapidly increasing network activity, must quickly
perceive the security state of their networks, but they often have only text-based tools to work …

Real-time visualization of network behaviors for situational awareness

DM Best, S Bohn, D Love, A Wynne… - Proceedings of the seventh …, 2010 - dl.acm.org
Plentiful, complex, and dynamic data make understanding the state of an enterprise network
difficult. Although visualization can help analysts understand baseline behaviors in network …

Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats

F Mansmann, DA Keim, SC North… - … on Visualization and …, 2007 - ieeexplore.ieee.org
The Internet has become a wild place: malicious code is spread on personal computers
across the world, deploying botnets ready to attack the network infrastructure. The vast …

Situ: Identifying and explaining suspicious behavior in networks

JR Goodall, ED Ragan, CA Steed… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Despite the best efforts of cyber security analysts, networked computing assets are routinely
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …

Bubblenet: A cyber security dashboard for visualizing patterns

S McKenna, D Staheli, C Fulcher… - Computer Graphics …, 2016 - Wiley Online Library
The field of cyber security is faced with ever‐expanding amounts of data and a constant
barrage of cyber attacks. Within this space, we have designed BubbleNet as a cyber security …

Real-time and forensic network data analysis using animated and coordinated visualization

S Krasser, G Conti, J Grizzard… - … from the Sixth …, 2005 - ieeexplore.ieee.org
Rapidly detecting and classifying malicious activity contained within network traffic is a
challenging problem exacerbated by large datasets and functionally limited manual analysis …