-
2
-
-
0012127229
-
Intrusion and intrusion detection
-
J. McHugh, "Intrusion and Intrusion Detection," Int'l J. of Information Security, vol. 1, no. 1, 2001, pp. 14-35.
-
(2001)
Int'l J. of Information Security
, vol.1
, Issue.1
, pp. 14-35
-
-
McHugh, J.1
-
4
-
-
0003914522
-
-
Tech. Report CMU/SEI-99-TR-028
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner, State of the Practice of Intrusion Detection Technologies, Tech. Report CMU/SEI-99-TR-028, 1999.
-
(1999)
State of the Practice of Intrusion Detection Technologies
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
5
-
-
0003488008
-
-
San Francisco, CA, USA: Morgan Kaufman Publishers
-
S. K. Card, J. D. Mackinlay, and B. Shneiderman, Information Visualization: Using Vision to Think. San Francisco, CA, USA: Morgan Kaufman Publishers, 1999.
-
(1999)
Information Visualization: Using Vision to Think
-
-
Card, S.K.1
Mackinlay, J.D.2
Shneiderman, B.3
-
6
-
-
35048844016
-
Two visual computer network security monitoring tools incorporating operator interface requirements
-
W. Yurcik, J. Barlow, K. Lakkaraju, and M. Haberman, "Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements," ACM CHI Workshop HCI and Security Systems (HCISEC), 2003.
-
(2003)
ACM CHI Workshop HCI and Security Systems (HCISEC)
-
-
Yurcik, W.1
Barlow, J.2
Lakkaraju, K.3
Haberman, M.4
-
7
-
-
33750908204
-
Visual problem-solving support for new event triage in centralized network security monitoring: Challenges, tools and benefits
-
M. Stolze, R. Pawlitzek, and A. Wespi, "Visual Problem-Solving Support for New Event Triage in Centralized Network Security Monitoring: Challenges, Tools and Benefits," GI-SIDAR Conf. IT-Incident Management & IT-Forensics (IMF), 2003.
-
(2003)
GI-SIDAR Conf. IT-Incident Management & IT-Forensics (IMF)
-
-
Stolze, M.1
Pawlitzek, R.2
Wespi, A.3
-
8
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
R. Ball, G. A. Fink, and C. North, "Home-Centric Visualization of Network Traffic for Security Administration," ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC), 2004, pp. 55-64.
-
(2004)
ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
-
9
-
-
0029272732
-
Visualizing network data
-
R. A. Becker, S. G. Eick, and A. R. Wilks, "Visualizing Network Data," IEEE Transactions on Visualization and Computer Graphics, vol. 1, no. 1, 1995, pp. 16-28.
-
(1995)
IEEE Transactions on Visualization and Computer Graphics
, vol.1
, Issue.1
, pp. 16-28
-
-
Becker, R.A.1
Eick, S.G.2
Wilks, A.R.3
-
10
-
-
21944445756
-
Visual data mining: Recognizing telephone calling fraud
-
K. C. Cox, S. G. Eick, and G. J. Wills, "Visual Data Mining: Recognizing Telephone Calling Fraud," J. of Data Mining and Knowledge Discovery, vol. 1, no. 2, 1997, pp. 225-231.
-
(1997)
J. of Data Mining and Knowledge Discovery
, vol.1
, Issue.2
, pp. 225-231
-
-
Cox, K.C.1
Eick, S.G.2
Wills, G.J.3
-
11
-
-
13944256121
-
VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness
-
X. Yin, W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju, "VisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness," ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC), 2004, pp. 26-34.
-
(2004)
ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
-
14
-
-
20444484611
-
NvisionIP: NctFlow visualizations of system state for security situational awareness
-
K. Lakkaraju, W. Yurcik, and A. J. Lee, "NvisionIP: NctFlow Visualizations of System State for Security Situational Awareness," ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC), 2004, pp. 65-72.
-
(2004)
ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
15
-
-
20444495766
-
PortVis: A tool for port-based detection of security events
-
J. McPherson, K.-L. Ma, P. Krystosk, T. Bartoletti, and M. Christensen, "PortVis: A Tool for Port-Based Detection of Security Events," ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC), 2004, pp. 73-81.
-
(2004)
ACM Workshop Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
, pp. 73-81
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
16
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
R. F. Erbacher, K. L. Walker, and D. A. Frincke, "Intrusion and Misuse Detection in Large-Scale Systems," IEEE Computer Graphics and Applications, vol. 22, no. 1, 2002, pp. 38-48.
-
(2002)
IEEE Computer Graphics and Applications
, vol.22
, Issue.1
, pp. 38-48
-
-
Erbacher, R.F.1
Walker, K.L.2
Frincke, D.A.3
-
17
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," Proc. 13th Systems Admin. Conference (LISA), 1999, pp. 229-238.
-
(1999)
Proc. 13th Systems Admin. Conference (LISA)
, pp. 229-238
-
-
Roesch, M.1
-
18
-
-
0034286624
-
Building a perceptual visualization architecture
-
C. G. Healey, "Building a Perceptual Visualization Architecture," Behaviour and Information Technology, vol. 19, no. 5, 2000, pp. 349-367.
-
(2000)
Behaviour and Information Technology
, vol.19
, Issue.5
, pp. 349-367
-
-
Healey, C.G.1
-
19
-
-
0028134353
-
Visual information seeking: Tight coupling of dynamic query filters with starfield displays
-
C. Ahlberg and B. Shneiderman, "Visual Information Seeking: Tight Coupling of Dynamic Query Filters with Starfield Displays," ACM Conf. Human Factors in Computing Systems (CHI), 1994, pp. 313-317.
-
(1994)
ACM Conf. Human Factors in Computing Systems (CHI)
, pp. 313-317
-
-
Ahlberg, C.1
Shneiderman, B.2
-
20
-
-
84900523006
-
The perspective wall: Detail and context smoothly integrated
-
J. D. Mackinlay, G. G. Robertson, and S. K. Card, "The Perspective Wall: Detail and Context Smoothly Integrated," ACM Conf. Human Factors in Computing Systems (CHI), 1991, pp. 173-179.
-
(1991)
ACM Conf. Human Factors in Computing Systems (CHI)
, pp. 173-179
-
-
Mackinlay, J.D.1
Robertson, G.G.2
Card, S.K.3
|