default search action
VizSEC 2007: Sacramento, California, USA
- John R. Goodall, Gregory J. Conti, Kwan-Liu Ma:
4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007. Mathematics and Visualization, Springer 2008, ISBN 978-3-540-78242-1 - John R. Goodall:
Introduction to Visualization for Computer Security. 1-17 - Anita D. D'Amico, K. Whitley:
The Real Work of Computer Network Defense Analysts. 19-37 - Jennifer Stoll, Dave McColgin, Michelle Gregory, Vern Crow, W. Keith Edwards:
Adapting Personas for Use in Security Visualization Design. 39-52 - Xiaoyuan Suo, Ying Zhu, G. Scott Owen:
Measuring the Complexity of Computer Security Visualization Designs. 53-66 - T. H. Yu, Benjamin W. Fuller, J. H. Bannick, Lee M. Rossey, Robert K. Cunningham:
Integrated Environment Management for Information Operations Testbeds. 67-83 - Doantam Phan, John Gerth, M. Lee, Andreas Paepcke, Terry Winograd:
Visual Analysis of Network Flow Data with Timelines and Event Plots. 85-99 - Teryl Taylor, Stephen Brooks, John McHugh:
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior. 101-114 - Denis Lalanne, Enrico Bertini, Patrick Hertzog, P. Bados:
Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today. 115-130 - Jason Pearlman, Penny Rheingans:
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective. 131-146 - Barry Irwin, Nick Pilkington:
High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping. 147-158 - Stefano Foresti, James Agutter:
VisAlert: From Idea to Product. 159-174 - Dino Schweitzer, Leemon C. Baird III, William L. Bahn:
Visually Understanding Jam Resistant Communication. 175-186 - Florian Mansmann, L. Meier, Daniel A. Keim:
Visualization of Host Behavior for Network Security. 187-202 - William A. Pike, Chad Scherrer, S. Zabriskie:
Putting Security in Context: Visual Correlation of Network Activity with Real-World Information. 203-220 - Leevar Williams, Richard Lippmann, Kyle Ingols:
An Interactive Attack Graph Cascade and Reachability Display. 221-236 - Chris Muelder, Lei Chen, Russell Thomason, Kwan-Liu Ma, Tony Bartoletti:
Intelligent Classification and Visualization of Network Scans. 237-253 - Barry Irwin, Jean-Pierre van Riel:
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope. 255-273
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.