Visual Analytics for BGP Monitoring and Prefix Hijacking Identification (Unknown)
- New search for: Biersack, Ernst
- New search for: Biersack, Ernst
- New search for: Jacquemart, Quentin
- New search for: Fischer, Fabian
- New search for: Fuchs, Johannes
- New search for: Thonnard, Olivier
- New search for: Theodoridis, Georgios
- New search for: Tzovaras, Dimitrios
- New search for: Vervier, Pierre-Antoine
In:
IEEE network
;
26
, 6
; 33-39
;
2012
-
ISSN:
- Article (Journal) / Print
-
Title:Visual Analytics for BGP Monitoring and Prefix Hijacking Identification
-
Contributors:
-
Published in:IEEE network ; 26, 6 ; 33-39
-
Publisher:
- New search for: IEEE
-
Place of publication:New York, NY
-
Publication date:2012
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:Unknown
- New search for: 770/3155
- New search for: 54.32 / 54.00
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 26, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Table of contents| 2012
- 2
-
Editor's noteShen, Xuemin et al. | 2012
- 4
-
Computer network visualization [Guest Editorial]Goodall, John R. / Mansmann, Florian / Gerth, John et al. | 2012
- 4
-
Special Issue - Computer Network Visualization - Guest EditorialGoodall, John R et al. | 2012
- 6
-
The future of security visualization: Lessons from network visualizationHarrison, L. / Aidong Lu, et al. | 2012
- 12
-
Alertwheel: radial bipartite graph visualization applied to intrusion detection system alertsDumas, M. / Robert, J-M / McGuffin, M. J. et al. | 2012
- 19
-
Navigating and visualizing the malware intelligence spaceMassicotte, F. / Couture, M. / Normandin, H. / Letourneau, M. et al. | 2012
- 26
-
I can see for miles: Re-visualizing the internetKnight, S. / Falkner, N. / Nguyen, H. X. / Tune, P. / Roughan, M. et al. | 2012
- 33
-
Visual analytics for BGP monitoring and prefix hijacking identificationBiersack, E. / Jacquemart, Q. / Fischer, F. / Fuchs, J. / Thonnard, O. / Theodoridis, G. / Tzovaras, D. / Vervier, P. et al. | 2012
- 40
-
Contextualized monitoring and root cause discovery in IPTV systems using data visualizationSedlar, U. / Volk, M. / Sterle, J. / Kos, A. / Sernec, R. et al. | 2012
- 48
-
Wireless network deployment in the smart grid: Design and evaluation issuesGentile, C. / Griffith, D. / Souryal, M. et al. | 2012
- 48
-
Accepted from Open Call - Wireless Network Deployment in the Smart Grid: Design and Evaluation IssuesGentile, Camillo et al. | 2012
- 54
-
Cellular-based machine-to-machine: overload controlKsentini, A. / Hadjadj-Aoul, Y. / Taleb, T. et al. | 2012
- 61
-
Energy efficiency in passive optical networks: where, when, and how?Valcarenghi, L. / Dung Pham Van, / Raponi, Pier Giorgio / Castoldi, P. / Campelo, D. R. / Wong, S. / Yen, S. / Kazovsky, L. G. / Yamashita, S. et al. | 2012
- 69
-
Toward secure and effective data utilization in public cloudKui Ren, / Cong Wang, / Qian Wang, et al. | 2012
- 75
-
Arabian nights: measuring the arab internet during the 2011 eventsShavitt, Y. / Zilberman, N. et al. | 2012
- c1
-
IEEE Network [Cover]| 2012