[HTML][HTML] 基于大数据的网络安全与情报分析

陈兴蜀, 曾雪梅, 王文贤, 邵国林 - 2017 - jsuese.cnjournals.com
随着IT 技术和通信技术的发展, 网络环境日趋复杂, 云计算和虚拟化等技术的应用,
使得主机边界, 网络边界也变得动态和模糊. 同时, 网络攻击频繁, 隐蔽性, 持续性 …

Functional requirements of situational awareness in computer network security

C Onwubiko - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
The underpinning of situational awareness in computer networks is to identify adversaries,
estimate impact of attacks, evaluate risks, understand situations and make sound decisions …

Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite.

W Yurcik - LISA, 2005 - usenix.org
The first step in improving Internet security is measurement-security events must be made
visible. The irony in making this happen is that there is no lack of security measurement …

Flow-inspector: a framework for visualizing network flow data using current web technologies

L Braun, M Volke, J Schlamp, A von Bodisco, G Carle - Computing, 2014 - Springer
New web technologies led to the development of browser applications for data analysis.
Modern browser engines allow for building interactive real-time visualization applications …

Vehicle network security situation assessment method based on attack tree

R Li, F Li, J Zhang - IOP Conference Series: Earth and …, 2020 - iopscience.iop.org
In order to solve the problem that the current vehicle network security situation assessment
methods are seriously few, and the existing methods have low accuracy and are greatly …

[图书][B] A task-centered visualization design environment and a method for measuring the complexity of visualization designs

X Suo - 2009 - search.proquest.com
Recent years have seen a growing interest in the emerging area of computer security
visualization which is about developing visualization methods to help solve computer …

Designing Information Systems and network components for situational awareness

C Onwubiko - Situational awareness in computer network defense …, 2012 - igi-global.com
Operators need situational awareness (SA) of their organisation's computer networks and
Information Systems in order to identify threats, estimate impact of attacks, evaluate risks …

Tool update: visflowconnect-IP with advanced filtering from usability testing

W Yurcik - Proceedings of the 3rd international workshop on …, 2006 - dl.acm.org
Tool Update: VisFlowConnect-IP with Advanced Filtering from Usability Testing Page 1 Tool
Update: VisFlowConnect-IP with Advanced Filtering from Usability Testing William Yurcik …

[PDF][PDF] Visualization of multivariate data

J Claessen - 2011 - pure.tue.nl
Visualization of Multivariate Data Page 1 Eindhoven University of Technology MASTER
Visualization of multivariate data network monitoring data case study Claessen, JHT Award …

An Evaluation of Architectural Threats to Internet Routing

J Schlamp - 2016 - mediatum.ub.tum.de
The Internet is an integral part of today's way of life and a critical business infrastructure at
the same time. Since its early beginnings, resilience has been embedded deeply into the …