2Theureau J.Use of nuclear-reactor control room simulators inresearch & development.In:7th IFAC/IFIP/IFORS/IEA Symposium on Analysis,Design and Evaluation of MAN-MACHINE SYSTEMS,Kyoto.1998.425~430
3Endsley M R.Design and evaluation for situation awareness enhancement.Paper presented at the Human Factors Society 32nd Annual Meeting.Santa Monica,CA,1988
4Bass T,Gruber D.A glimpse into the future of id.http://www.usenix.org/publications /login/1999-9/features/future.html,1999
5Bass T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99~105
6Batsell S G,Rao N S,Shankar M.Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security.http://www.ioc.ornl.gov/projects/documents/containment.pdf,2005
7Shifflet J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13~19
8DeMontigny-Leboeuf A,Massicotte F.Passive network discovery for real time situation awareness.NATO/RTO Adaptive Defence in Unclassified Networks,Toulouse,France,April 2004
9Yurcik W,et al.Two visual computer network security monitoring tools incorporating operator interface requirements.ACM CHI Workshop on Human-Computer Interaction and Security Systems(HCISEC),2003
10Lau S.The spinning cube of potential doom.Communications of the ACM,2004,47(6):25~26