Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (12): 48-50    DOI:
Current Issue | Archive | Adv Search |
Analysis of Network Security Visualization Technology
Shen Shuping
Nantong Health Branch School of Jiangsu Union Technical Institute
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the rapid development of network, people put forward higher requirements for network security, The emergence of network visualization technology can meet the needs greatly. It can analyze and detect the abnormal situation of the network with strong visual ability, and show a variety of situation of the network system to users through the visualization way. This paper mainly analyzes the necessity, technical methods and future trend of network security visualization technology.
Key wordsnetwork security      data      visualization      integration analysis     
Published: 15 November 2017
:  TP393  

Cite this article:

Shen Shuping. Analysis of Network Security Visualization Technology. Computer & Telecommunication, 2016, 1(12): 48-50.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2016/V1/I12/48

[1] PAN Qi CAI Si-bo WEI Fang-fang. Building Method for Data Lineage Based on Data Table Similarity Calculation [J]. 电脑与电信, 2024, 1(6): 11-.
[2] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[3] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[4] HUANG Hui-jun  WANG Bo  LI Yu-zhong . Data Analysis on the Utilization Rate of“ Whole Village Credit” for Local Rural Commercial Bank ——Take H Rural Commercial Bank for Example[J]. 电脑与电信, 2024, 1(5): 1-.
[5] WANG Yu-lin WANG Jin-heng ZHAO Yu-qi XIE Xiao-hui. Teaching Innovation and Practice of "Triple Optimization and Innovation" in the Course of Database Principle and Application in Private Universities under the Background of Information Technology Innovation[J]. 电脑与电信, 2024, 1(5): 42-.
[6] GUO Xu-kun. Research on the Development Situation and Coordination Strategy of Multi Department Data Sharing of Digital Government in Guangdong - Hong Kong - Macao Greater Bay Area[J]. 电脑与电信, 2024, 1(5): 47-.
[7] TANG Qian-yuan  GUO Yun-di . Exploration of Data Structure Practice Courses for Non-computer Majors under the Background of "Emerging Engineering Education"[J]. 电脑与电信, 2024, 1(5): 57-.
[8] XIAO Jing-hui CHEN Jian. Smart City Operation Command and Dispatch Platform Solution Based on Digital Twin[J]. 电脑与电信, 2024, 1(5): 98-.
[9] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[10] NIE Cheng WANG Jie.
A Review of Research and Development in Data Analysis Methods
[J]. 电脑与电信, 2024, 1(4): 200-25.
[11] JIANG Lei HU Juan.
Teaching Reform of Data Visualization Technology Course Based on OBE
[J]. 电脑与电信, 2024, 1(4): 38-42.
[12] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[13] WANG Zi-ming XIAO Da-wei LIU Ya-nan. Knowledge Graph Construction for Data Science and Big Data Technology[J]. 电脑与电信, 2024, 1(1): 32-34.
[14] ZHANG Jing-wu SONG Jin-ling, JIA Dong-yan, MENG Hai-tao ZHANG Chen-lu. Construction and Application of Knowledge Graph of River Pollution[J]. 电脑与电信, 2023, 1(5): 12-.
[15] ZHANG Yu-meng JI Xiao-jun. Research and Implementation of Imitation Learning Algorithm[J]. 电脑与电信, 2023, 1(5): 38-.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd