Author Unknown, “Visualization of Network Attacks”, Internet site: http://microelec.eng.morgan.edu/˜web/network_viz/netviz.htm.* |
PCT International Search Report dated Dec. 2, 1999 for PCT/US99/12394 dated Jul. 20, 1999. |
PCT International Search Report dated Dec. 1, 1999 for PCT/US99/16467 dated Jul. 20, 1999. |
Deri L. Mankis D., “VRML: Adding 3D to Network Managment”, 4th International Conference on Intelligence in Services and Networks, pp. 469-477, May 27-29, 1997. |
Law A M et al, “Simulation Software for Communications Networks: The State of the Art,” IEEE Communications Magazine, vol. 32, No. 3, pp. 44-50, Mar. 1, 1994. |
Chang C K; Al-Saloan Y Y; Defanti T, Scientific Visualization: A Performance Study of CSMA/CD with Connected Data Links—(Hybrid-Ethernet), Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems, pp. 389-394, Apr. 14-16, 1992. |
PCT International Search Report dated Nov. 17, 1999 for PCT/US99/12393 dated Jul. 20, 1999. |
Sczepansky A, “Auf Herz Und Nieren Pruefen”, Elektronik, De, Franzis Verlag GMBH, pp. 78-81, Apr. 2, 1997. |
Yau S S et al, “An Interactive Software Maintenance Environment,” AFIPS Conference Proceedings, pp. 553, 555-561, Jun. 1987. |
Lo R et al, “Towards a Testbed for Malicious Code Detection,” Computer Society Annual Conference, p. 160-166, 1991. |
Saito T et al, “Protection Against Trojan Horses by Source Code Analysis,” Electronics & Communications in Japan, Part III—Fundamental Electronic Science, pp. 11-18, Jan. 1994. |