Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (12): 48-50    DOI:
Current Issue | Archive | Adv Search |
Analysis of Network Security Visualization Technology
Shen Shuping
Nantong Health Branch School of Jiangsu Union Technical Institute
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the rapid development of network, people put forward higher requirements for network security, The emergence of network visualization technology can meet the needs greatly. It can analyze and detect the abnormal situation of the network with strong visual ability, and show a variety of situation of the network system to users through the visualization way. This paper mainly analyzes the necessity, technical methods and future trend of network security visualization technology.
Key wordsnetwork security      data      visualization      integration analysis     
Published: 15 November 2017
ZTFLH:  TP393  

Cite this article:

Shen Shuping. Analysis of Network Security Visualization Technology. Computer & Telecommunication, 2016, 1(12): 48-50.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I12/48

[1] WENG Geng-peng ZHENG Xiao-fan PAN Liang RAO Hao. Analysis of Gesture Recognition Model Based on Mobile Device[J]. 电脑与电信, 2021, 1(8): 22-25.
[2] ZHOU Chao-xuan LIU Xiao-ying. The Resources Construction and Discussion on the Implementation Scheme of Blended Teaching Model of Data Structure Course[J]. 电脑与电信, 2021, 1(8): 33-36.
[3] TANG Xiao-qing. A Semi-supervised Linear Subspace Learning Approach via Sparse Coding[J]. 电脑与电信, 2021, 1(8): 44-48.
[4] CHEN Shuang-quan. Design of Real-time Database for Automatic Measurement and Control System [J]. 电脑与电信, 2021, 1(8): 49-51.
[5] WANG Mao-fa WANG Zi-min WANG Hua-deng LIU Zhen-bing. Construction and Research on Data Mining Course Based on Jupyter[J]. 电脑与电信, 2021, 1(7): 12-16.
[6] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[7] WANG Jia-hao. Risk Evaluation of Telecom Big Data Application Project Based on AHP-entropy Weight Method[J]. 电脑与电信, 2021, 1(7): 53-55.
[8] GE Xiao-yan. Exploring on Mixed Teaching Reform of Data Mining Course[J]. 电脑与电信, 2021, 1(6): 43-46.
[9] DU Qiao-bao LI Ling. Research and Implementation of Visual Operation and Maintenance of University Data Center Based on Elastic Stack[J]. 电脑与电信, 2021, 1(6): 60-64.
[10] ZHANG Chun LIU Chao LIU Xv-dong CHEN Zhi-hao JIANG Yong ZHANG Hui ZHOU Hui HU Jian-cun. Consumer Portrait Construction and Potential Consumer Mining Method in Business District[J]. 电脑与电信, 2021, 1(6): 79-86.
[11] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[12] LIN Yi-xi. Research on the "Data + Capability" IT Management Mode Supporting the User Migration Maintenance and Development Innovation#br#[J]. 电脑与电信, 2021, 1(5): 63-66.
[13] YAO Jian-sheng LIU Yan-ling. Teaching Reform and Practice of Smart Tourism Data Science Course[J]. 电脑与电信, 2021, 1(4): 9-11.
[14] SONG Man. Research on Talents Training Program of Big Data Majors in Higher Vocational Colleges ——Taking Guangzhou City Construction College as an Example[J]. 电脑与电信, 2021, 1(4): 16-22.
[15] LI Ai-sheng. Exploration and Practice of Intelligent Training Based on CDL Architecture ——Take the Major of Information Security and Management as an Example[J]. 电脑与电信, 2021, 1(4): 81-85.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd