Case study: interactive visualization for internet security
Proceedings of the conference on Visualization '02
Unsupervised learning techniques for an intrusion detection system
Proceedings of the 2004 ACM symposium on Applied computing
Detecting Flaws and Intruders with Visual Data Analysis
IEEE Computer Graphics and Applications
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Home-centric visualization of network traffic for security administration
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
A Visual Exploration Process for the Analysis of Internet Routing Data
Proceedings of the 14th IEEE Visualization 2003 (VIS'03)
CluVis: dual-domain visual exploration of cluster/network metadata
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Visualizing Real-Time Network Resource Usage
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Neural visualization of network traffic data for intrusion detection
Applied Soft Computing
A genetic SOM clustering algorithm for intrusion detection
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
A survey of security visualization for computer network logs
Security and Communication Networks
Hi-index | 0.01 |