Detecting malicious logins in enterprise networks using visualization

H Siadati, B Saket, N Memon - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Enterprise networks have been a frequent target of data breaches and sabotage. In a widely
used method, attackers establish a foothold in the target network by compromising a single …

[PDF][PDF] 多视图合作的网络流量时序数据可视分析

赵颖, 王权, 黄叶子, 吴青, 张胜 - 软件学报, 2016 - jos.org.cn
网络安全可视化作为一个交叉应用研究领域, 为传统网络安全数据分析方法注入了新的活力.
但已有研究过于注重网络安全数据的可视表达, 而忽视了对分析流程的支持 …

A traffic visualization framework for monitoring large-scale inter-datacenter network

M Elbaham, KK Nguyen… - 2016 12th International …, 2016 - ieeexplore.ieee.org
Diversity, dynamicity, and the huge volume of traffic in the network between datacenters has
risen network administrators concerns on how to efficiently visualize their system in real …

DOT-K: A distributed online top-K elements algorithm using extreme value statistics

N Carey, T Budavári, Y Ahmad… - 2016 IEEE 12th …, 2016 - ieeexplore.ieee.org
Extremely large (peta-scale) data collections are generally partitioned into millions of
containers (disks/volumes/files) which are essentially unmovable due to their aggregate …

[PDF][PDF] Network Traffic Visualisation and Correlation

M Kollmar - 2016 - academia.edu
Network traffic is, by its nature, voluminous, ubiquitous and everincreasing. It is often
feasible to retain only meta-data due to storage costs and restrictions. However, this data …

[引用][C] 基于TcpFlow 的网络可视分析系统研究与实现

孟浩, 王劲松, 黄静耘, 南慧荣 - 信息网络安全, 2016

[引用][C] 基于矩形树图和折线图的网络流量分析

牛泽杰, 李启南, 李强军 - 兰州交通大学学报, 2016

[引用][C] 多种可视化技术相结合的网络安全数据分析研究

廖雨婷 - 通信技术, 2016