咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 1 篇 计算机科学与技术...
    • 1 篇 网络空间安全

主题

  • 2 篇 network anomaly ...
  • 2 篇 visualization
  • 1 篇 data visualisati...
  • 1 篇 computer network...
  • 1 篇 multiple commodi...
  • 1 篇 intrusion detect...
  • 1 篇 malicious users
  • 1 篇 log data analysi...
  • 1 篇 web-based open p...
  • 1 篇 ids log
  • 1 篇 interactive visu...
  • 1 篇 faulty devices
  • 1 篇 anomaly detectio...
  • 1 篇 network anomaly ...
  • 1 篇 malicious applic...
  • 1 篇 servers
  • 1 篇 network anomaly
  • 1 篇 internet
  • 1 篇 market research
  • 1 篇 suspicious patte...

机构

  • 1 篇 state key labora...
  • 1 篇 chinese acad sci...
  • 1 篇 cent michigan un...

作者

  • 1 篇 zhang tao
  • 1 篇 yuxin ma
  • 1 篇 zongzhuang li
  • 1 篇 liao qi
  • 1 篇 tianye zhang
  • 1 篇 wei chen
  • 1 篇 shi lei
  • 1 篇 fangzhou guo
  • 1 篇 xumeng wang

语言

  • 2 篇 英文
检索条件"主题词=Network Anomaly Visualization"
2 条 记 录,以下是1-10 订阅
排序:
A survey of network anomaly visualization
收藏 引用
Science China(Information Sciences) 2017年 第12期60卷 126-142页
作者: Tianye ZHANG Xumeng WANG Zongzhuang LI Fangzhou GUO Yuxin MA Wei CHEN State Key Laboratory of CAD & CG Zhejiang University
network anomaly analysis is an emerging subtopic of network security. network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of intelligent visual tools are developed ... 详细信息
来源: 评论
Bridging the Gap of network Management and anomaly Detection through Interactive visualization
Bridging the Gap of Network Management and Anomaly Detection...
收藏 引用
IEEE Pacific visualization Symposium (PacificVis)
作者: Zhang, Tao Liao, Qi Shi, Lei Cent Michigan Univ Dept Comp Sci Mt Pleasant MI 48859 USA Chinese Acad Sci State Key Lab Comp Sci Inst Software Beijing 100864 Peoples R China
Large-scale networks have become increasingly challenging to manage. It is vital for a system administrator or network manager to be able to analyze the vast amount of log data in order to detect suspicious behaviors ... 详细信息
来源: 评论