概略 | on Visualization and Computer Graphics, 2011, 1(1): 1-19. [5] HARRISON L, LU Aidong. The future of security visualization: lessons from network visualization[J]. IEEE Network, 2012, 26(6): 6-11. [6] 王天佐, 王怀... Research and Development, 2013, 50(10): 2133-2139. [8] 郑皓, 陈石, 梁友. 关于"数字大炮"网络攻击方式及其防御措施的探讨[J]. 计算机研究与发展, 2012(S2): 69-73. ZHENG Hao, CHEN Shi, LIANG You. How the cyber weapon "digital ordnance" works...... |