Survey on the visualization technologies of threatening security data in cyber space
With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of sci...
Saved in:
Main Authors: | Fan ZHANG, Fan XIE, Jie JIANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018013 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
by: Jian-hua LI
Published: (2016-02-01) -
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
by: Esra Merve Çalışkan
Published: (2024-12-01) -
CYBER SECURITY INVESTMENT
by: Dujam Kovač
Published: (2021-07-01) -
Cyber ranges: survey and perspective
by: ZOU Xing, et al.
Published: (2024-10-01) -
A Comprehensive Review of Key Cyber-Physical Systems, and Assessment of Their Education Challenges
by: Imre Kocsis, et al.
Published: (2025-01-01)