1. 1 . Erbacher , R.F. Glyph-based generic network visualization . Proc. SPIE Conference on Visualization and Data Analysis , ( 2002 ), 228 - 237 . 1. Erbacher, R.F. Glyph-based generic network visualization. Proc. SPIE Conference on Visualization and Data Analysis, (2002), 228-237.
2. Intrusion and misuse detection in large-scale systems
3. 3 . Fortier , S.C. & Shombert , L.A. Network profiling and data visualization . Proc. IEEE Systems Man and Cybernetics Society Information Assurance and Security Workshop , ( 2000 ), 136 - 142 . 3. Fortier, S.C. & Shombert, L.A. Network profiling and data visualization. Proc. IEEE Systems Man and Cybernetics Society Information Assurance and Security Workshop, (2000), 136-142.
4. 4 . Girardin , L. & Brodbeck , D. A visual approach for monitoring logs . Proc. Systems Administration Conference (LISA) , ( 1998 ), 299 - 308 . 4. Girardin, L. & Brodbeck, D. A visual approach for monitoring logs. Proc. Systems Administration Conference (LISA), (1998), 299-308.
5. 6 . Northcutt , S. , Novak , J. , & McLachlan , D. Network intrusion detection: An analyst's handbook . ( 2 nd ed.) New Riders Publishers , Indianapolis, IN, USA , 2000 . 6. Northcutt, S., Novak, J., & McLachlan, D. Network intrusion detection: An analyst's handbook. (2nd ed.) New Riders Publishers, Indianapolis, IN, USA, 2000.