This blog was thought as an online archive of products and tools that uses visualization as analysis and comprehension method of the network threats' phenomena. The shown examples include a wide range of different types of both malicious activities and visualization methods.
Monday, February 7, 2011
the project
working on a new visual application for security visualization
No comments:
Post a Comment