3Lau S. The spinning cube of potential doom. Communications of the ACM, 2004, 47(6): 25-26
4Lakkaraju K, Yurcik W, Lee A J. NVisionlP: Netflow visualizations of system state for security situational awareness// Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington DC, 2004: 65-72
5Yin X, Yurcik W, Treaster M. VisFlowConnect: Netflow visualizations of link relationships for security situational awareness//Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington DC, 2004:26-34
6Bass T. Intrusion detection systems & multisensor data fusion: Creating cyberspace situational awareness. Communications of the ACM, 2000, 43(4): 99-105
7D' Ambrosio B. Security situation assessment and response evaluation (SSARE)//Proceedings of the DARPA Informa- tion Survivability Conference & Exposition Ⅱ. Anaheim, 2001 : 387-394
8Yegneswaran V, Barford P, Paxson V. Using honeynets for internet situational awareness//Proceedings of the 4th Workshop on Hot Topics in Networks. Maryland, 2005
9George E P B, Gwilym M J. Time Series Analysis: Forecasting and Control. San Francisco: Holden Day Inc. , 1976
10Fall K, Varadhan K. The ns manual (formerly ns notes and documentation). California: UC Berkeley, LBL, USC/ISI, and Xerox PARC, 2007