Author:
Xu Wenjuan,Shehab Mohamed,Ahn Gail-Joon
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference40 articles.
1. Anderson, A.P.: Computer Security Technology Planning Study. Technical Report ESD-TR-73-51, II (1972)
2. Aris, A.: Network visualization by semantic substrates. IEEE Trans. Vis. Comput. Graph. 12(5), 733–740 (2006). Senior Member-Ben Shneiderman
3. Biba, K.J.: Integrity Consideration for Secure Compuer System. Technical report, Mitre Corp. Report TR-3153, Bedford, Mass (1977)
4. Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236–243 (1976)
5. Erbacher, R.: Intrusion behavior detection through visualization. In: IEEE International Conference on Systems, Man and Cybernetics, pp. 2507–2513 (Oct 2003)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献