FENG Tonghan, AI Zhongliang. Building and Displaying of Network Topology Model Based on GIS[J]. Computer and Modernization, doi: 10.3969/j.issn.10062475.2014.09.005.
1]
李艳霞,刘学,党寿江,等. 网管系统中基于谷歌地图的拓扑可视化实现[J]. 计算机工程与设计, 2013,34(2):681685.
[2] 邹晓天,余俊. 基于GIS的战术通信网络拓扑呈现技术研究[J]. 通信技术, 2014,47(2):231234.
[3] 何鹏,陆建新,施佺. 互联网拓扑可视化工具GeoPlot研究[J]. 计算机与现代化, 2011(4):6467.
[4] 申山宏,李龙江,夏棋. 基于移动GIS系统的网络拓扑图呈现机制[J], 微型机与应用, 2013(7):5357.
[5] 陈军,周晓光. 基于拓扑联动的增量更新方法研究[J]. 测绘学报, 2008,37(3):322329,337.
[6] 张伟明,罗军勇,王清贤. 网络拓扑可视化研究综述[J].计算机应用研究, 2008,25(6):16061610.
[7] 李琳,李杰. 基于SNMP的网络拓扑发现算法[J]. 计算机工程与设计, 2008,29(6):13451347.
[8] Matthew W, Georges G, Daniel K. Interactive Data Visualization: Foundations, Techniques and Applications[M]. AK Peters Ltd., 2010:2829.
[9] Shifflet J A. A Technique independent fusion model for network intrusion detection[C]// Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics. 2005:1319.
[10]Bejerano Y. Taking the skeletons out of the closets: A simple and efficient topology discovery scheme for large Ethernet[J]. IEEE/ACM Transactions on Networking, 2009,17(5):13851398.
[11]Wang Haoxiang. From a mess to graphic maps: Visualizaiton largescale heterogeneous networks[C]// Proceedings of the Second International Conference on Computer Modeling and Simulation. 2005:531535.
[12]Gregory C, Kulsoom A. Passive visual fingerprinting of network attack tools[C]// Proceedings of 2004 ACM Workshop on Visualization and Data Mining for Computer Security. 2004:4554.
[13]Li Xiangyu. A method of network topology visualization based on SNMP[C]// Proceedings of 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control. 2011:245248.
[14]Yang Guozheng, Lu Yuliang, Chen Huixian. A new network topology visualization algorithm[C]// Proceedings of 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control. 2011:369372.
[15]Li Xiangyan, Wang Qingxian,Yang Lin, et al. The research on network security visualization key technology[C]// Proceedings of 2012 Fourth International Conference on Multimedia Information Network and Security. 2012:983988.
[16]McCormick B H, DeFanti T A, Brown M D, et al. Visualization in scientific computing[J]. IEEE Computer Graphics and Applications, 1987,7(10): 69.
[17]Au S, Leckie C, Parhar A. Efficient visualization of large routing topologies[J]. International Journal of Network Management, 2004,9(2):105118.
[18]Li Xiaobin, Li Shuzhen. SNMPWebbased distributed network management system design and implementation[J]. Microcomputer Information, 2010,26(3):142143.