Publisher
Springer International Publishing
Reference42 articles.
1. Axelsson S (1999) The base-rate fallacy and its implications for the difficulty of intrusion detection. In: Proceedings of the 6th ACM conference on computer and communications security (ACM 1999), Singapore, pp 1–7
2. Axon L, Creese S, Goldsmith M, Nurse JRC (2016) Reflecting on the use of sonification for network monitoring, pp 254–261
3. Axon L, Nurse JRC, Goldsmith M, Creese S (2017) A formalised approach to designing sonification systems for network-security monitoring. Int J Adv Secur 10(1 and 2)
4. Ballora M, Hall DL (2010) Do you see what I hear: experiments in multi-channel sound and 3D visualization for network monitoring? 7709:77090J–7709-7. https://doi.org/10.1117/12.850319
5. Ballora M, Giacobe NA, Hall DL (2011) Songs of cyberspace: an update on sonifications of network traffic to support situational awareness. In: Braun JJ (ed) Multisensor, multisource information fusion: architectures, algorithms, and applications, vol 8064. International Society for Optics and Photonics
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献