[1] 黑静. "伪基站"工作原理及其鉴定检测的方法探讨[J]. 信息技术与信息化, 2014(4):251-253.(HEI J. The discussion about method of operating principle and identification of "pseudo base station"[J]. Information Technology and Informatization, 2014(4):251-253.) [2] 陈强, 刘亮. 基于智能手机的伪基站检测方法[J]. 信息安全与通信保密, 2014(12):131-134.(CHEN Q, LIU L. Detection method for pseudo base station based on smart phone[J]. Information Security and Communications Privacy, 2014(12):131-134.) [3] 姚景朋, 张立志, 何旭萌. 基于三维联合检测法的伪基站检测系统方案设计[J]. 电子设计工程, 2016, 24(14):52-55.(YAO J P, ZHANG L Z, HE X M. Design of the fake base station detection system based on three-dimension union detection method[J]. Electronic Design Engineering, 2016, 24(14):52-55.) [4] 王德广, 张旭. 利用手机信息精确定位伪基站的方法研究[J]. 微型电脑应用, 2014, 30(11):25-27.(WANG D G, ZHANG X. Study the method that using mobile phone information accurate positioning pseudo base station[J]. Microcomputer Applications, 2014, 30(11):25-27.) [5] 吴卓凡. 浅谈基于信令交互主动追踪车载伪基站的新方法[J]. 中国新通信, 2016(4):32-33.(WU Z F. A new method for tracking vehicle pseudo base station based on signaling interaction[J]. China New Telecommunications, 2016(4):32-33.) [6] ChinaVisChallenge1[EB/OL].[2017-09-18]. http://chinavis.org/2017/challenge.html. [7] KARAPISTOLI E, ECONOMIDES A A. Wireless sensor network security visualization[C]//Proceedings of the 20124th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops. Piscataway, NJ:IEEE, 2012:850-856. [8] LI X, WANG Q, YANG L, et al. Network security situation awareness method based on visualization[C]//Proceedings of the 2011 Third International Conference on Multimedia Information Networking and Security. Washington, DC:IEEE Computer Society, 2011:411-415. [9] ALSALEH M, ALQAHTANI A, ALARIFI A, et al. Visualizing PHPIDS log files for better understanding of Web server attacks[C]//VizSec 2013:Proceedings of the Tenth Workshop on Visualization for Cyber Security. New York:ACM, 2013:1-8. [10] COUDRIAU M, LAHMADI A, FRANCOIS J. Topological analysis and visualisation of network monitoring data:Darknet case study[C]//Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security. Piscataway, NJ:IEEE, 2017:1-6. [11] BERTINI E, HERTZOG P, LALANNE D. SpiralView:towards security policies assessment through visual correlation of network resources with evolution of alarms[C]//VAST 2007:Proceedings of the 2007 IEEE Symposium on Visual Analytics Science and Technology. Piscataway, NJ:IEEE, 2007:139-146. [12] LAKKARAJU K, YURCIK W, LEE A J. NVisionIP:netflow visualizations of system state for security situational awareness[C]//Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. New York:ACM, 2004:65-72. [13] FISCHER F, FUCHS J, VERVIER P A, et al. VisTracer:a visual analytics tool to investigate routing anomalies in traceroutes[C]//Proceedings of the Ninth International Symposium on Visualization for Cyber Security. New York:ACM, 2012:80-87. [14] TRILLANES A O, FABITO B S, FERNANDO M C G, et al. HealthSource:a Web based public health awareness with heat map on common illnesses using social media stream[C]//Proceedings of the 2016 IEEE Region 10 Conference. Piscataway, NJ:IEEE, 2016:3265-3269. [15] HENNIG P, BERGER P, BREHM M, et al. Hot spot detection-an interactive cluster heat map for sentiment analysis[C]//Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics. Piscataway, NJ:IEEE, 2015:1-9. [16] BLADIN K, AXELSSON E, BROBERG E, et al. Globe browsing:contextualized spatio-temporal planetary surface visualization[J]. IEEE Transactions on Visualization and Computer Graphics, 2018, 24(1):802-811. [17] 陆洋, 袁影, 李晓帆. 打击治理伪基站的问题及建议[J]. 数字通信世界, 2017(9):64-65.(LU Y, YUAN Y, LI X F, Problems and suggestions on combating and governing "pseudo-base station"[J]. Journal of Digital Communication World, 2017(9):64-65.) [18] CityIF.十城一日[EB/OL].[2017-05-10]. http://115.28.77.49:8080/TimelinealbumWeb.html. (CityIF. Ten cities one day[EB/OL].[2017-05-10]. http://115.28.77.49:8080/TimelinealbumWeb.html.) [19] 陈为,张嵩,鲁爱东. 数据可视化的基本原理与方法[M]. 北京:科学出版社, 2013:3-6.(CHEN W, ZHANG S, LU A D. Basic Principles and Methods of Data Visualization[M]. Beijing:Science Press, 2013:3-6.) |