ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A survey of security visualization for computer network logs
Security and Communication Networks
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
Information Sciences: an International Journal
Hi-index | 0.00 |
We have all become more security conscious because our daily life may be greatly affected by the unpredictable terrorism and nonstop cyber attacks. A rapidly growing effort is being made to address these security problems at different levels by collecting and analyzing vast amounts of information from diverse sources. As demonstrated in many other data analysis problems, visualization can be very useful when massive data is involved. For example, it is generally easier to understand the Internet connectivity and traffic or complex relations among people and events that are presented as a graph rather than as a table of descriptive information. Even more powerful is interactive visualization, which facilitates exploration in the data space.