1 |
C. Wu, S. Sheng, and X. Dong, "Research on visualization systems for DDoS attack detection," 2018 IEEE Interna- tional Conference on Systems, Man, and Cybernetics, pp. 2986-2991 January. 2019.
|
2 |
R. Marty, Applied Security Visualization, Pearson Education, Inc, Crawfordsville, 2008.
|
3 |
Jae Beom Park, Huy Kang Kim, and Eun Jin Kim, "Design and implementation of the honeycomb structure visualization system for the effective security situational awareness of large-scale networks," Journal of The Korea Institute of Information Security & Cryptology, 24(6), pp.1197-1213, Dec. 2014.
DOI
|
4 |
Dong Gun Lee, Huy Kang Kim, and Eun Jin Kim, "Study on security log visualization and security threat detection using RGB Palette," Journal of The Korea Institute of Information Security & Cryptology, 25(1), pp. 61-73, Feb. 2015.
DOI
|
5 |
Y. Okada, "Time-tunnel: 3D Visualization Tool and Its Aspects as 3D Parallel Coordinates," 2018 22nd International Conference Information Visualization, pp. 56-57, December. 2018.
|
6 |
H. Choi, H. Lee, and H. Kim, "Fast detection and visualization of network attacks on parallel coordinates," Computers and Security, vol. 28, no. 5, pp. 276-288, July. 2009.
DOI
|
7 |
V.T. Guimaraes, C.M.D.S. Freitas, R. Sadre, L.M.R. Tarouco, and L.Z. Granville, "A Survey on Information Visualization for Network and Service Management," IEEE Communication surveys & tutorials, vol. 18, no. 1, 2016.
|
8 |
M. Ring, D. Landes, and A. Hotho, "Detection of slow port scans in flow-based network traffic," PLOS ONE, vol. 13, no. 9, , Article number. e0204507, September. 2018.
|
9 |
Hyung Seok Kim, Suk Jun Ko, Dong Seong Kim, and Huy Kang Kim, "Firewall ruleset visualization analysis tool based on segmentation," 2017 IEEE Symposium on Visualization for Cyber Security(VizSec), Oct. 2017.
|