-
1
-
-
33745460819
-
Visualizing network data for intrusion detection
-
Abdullah, K., C. Lee, G. Conti, and J. A. Copeland. Visualizing network data for intrusion detection. IEEE Information Assurance Workshop, 2005. pp. 100-08, 2005.
-
(2005)
IEEE Information Assurance Workshop, 2005
, pp. 100-108
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
-
2
-
-
33749520207
-
IDS RainStorm: Visualizing IDS alarms
-
Abdullah, K., C. P. Lee, G. Conti, J. A. Copeland, and J. Stasko. IDS RainStorm: Visualizing IDS alarms. IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). pp. 1-10, 2005.
-
(2005)
IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)
, pp. 1-10
-
-
Abdullah, K.1
Lee, C.P.2
Conti, G.3
Copeland, J.A.4
Stasko, J.5
-
4
-
-
0023346285
-
Brushing Scatterplots
-
JSTOR. pp
-
Becker, R. A. and W. S. Cleveland. Brushing Scatterplots. Technometrics 29(2): JSTOR. pp. 127-42, 1987.
-
(1987)
Technometrics
, vol.29
, Issue.2
, pp. 127-142
-
-
Becker, R.A.1
Cleveland, W.S.2
-
5
-
-
0029272732
-
Visualizing network data
-
Becker, R. A., S. G. Eick, and A. R. Wilks. Visualizing network data. IEEE Transactions on Visualization and Computer Graphics 1(1). pp. 16-28, 1995.
-
(1995)
IEEE Transactions on Visualization and Computer Graphics
, vol.1
, Issue.1
, pp. 16-28
-
-
Becker, R.A.1
Eick, S.G.2
Wilks, A.R.3
-
6
-
-
0031375815
-
A spreadsheet approach to information visualization
-
Chi, E. H. H., P. Barry, J. Riedl, and J. Konstan. A spreadsheet approach to information visualization. Information Visualization, 1997. Proceedings., IEEE Symposium on. pp. 17-24, 1997.
-
(1997)
Information Visualization, 1997. Proceedings., IEEE Symposium on
, pp. 17-24
-
-
Chi, E.H.H.1
Barry, P.2
Riedl, J.3
Konstan, J.4
-
7
-
-
0029477046
-
Case study: 3D displays of Internet traffic
-
Cox, K. G and S. G. Eick. Case study: 3D displays of Internet traffic. Proceedings of INFOVIS 1995. pp. 129-31, 1995.
-
(1995)
Proceedings of INFOVIS 1995
, pp. 129-131
-
-
Cox, K.G.1
Eick, S.G.2
-
8
-
-
39049124290
-
-
Fails, J. A., A. Karlson, L. Shahamat, and B. Shneiderman. A Visual Interface for Multivariate Temporal Data: Finding Patterns of Events over Time. In Proceedings of IEEE Symposium on Visual Analytics Science and Technology (VAST '06), 2006.
-
Fails, J. A., A. Karlson, L. Shahamat, and B. Shneiderman. A Visual Interface for Multivariate Temporal Data: Finding Patterns of Events over Time. In Proceedings of IEEE Symposium on Visual Analytics Science and Technology (VAST '06), 2006.
-
-
-
-
9
-
-
33749532337
-
Preserving the Big Picture: Visual Network Traffic Analysis with TNV
-
Goodall, J. R., W. G. Lutters, P. Rheingans, and A. Komlodi. Preserving the Big Picture: Visual Network Traffic Analysis with TNV. IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). 2005.
-
(2005)
IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
10
-
-
84869129317
-
-
Goodall, J. R., A. A. Ozok, W. G. Lutters, and A. Komlodi. A user-centered approach to visualizing network traffic for intrusion detection. Conference on Human Factors in Computing Systems: ACM Press New York, NY, USA. pp. 1403-06, 2005.
-
Goodall, J. R., A. A. Ozok, W. G. Lutters, and A. Komlodi. A user-centered approach to visualizing network traffic for intrusion detection. Conference on Human Factors in Computing Systems: ACM Press New York, NY, USA. pp. 1403-06, 2005.
-
-
-
-
12
-
-
84998183152
-
Dynamic query tools for time series data sets: Timebox widgets for interactive exploration
-
Hochheiser, H. and B. Shneiderman. Dynamic query tools for time series data sets: Timebox widgets for interactive exploration. Information Visualization 3. pp. 1-18, 2004.
-
(2004)
Information Visualization
, vol.3
, pp. 1-18
-
-
Hochheiser, H.1
Shneiderman, B.2
-
14
-
-
20444484611
-
NVisionIP: Netflow visualizations of system state for security situational awareness
-
ACM Press New York, NY, USA. pp
-
Lakkaraju, K., W. Yurcik, and A. J. Lee. NVisionIP: netflow visualizations of system state for security situational awareness. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security: ACM Press New York, NY, USA. pp. 65-72, 2004.
-
(2004)
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
15
-
-
0030405302
-
Visualizing the global topology of the MBone
-
Munzner, T., E. Hoffman, K. Claffy, and B. Fenner. Visualizing the global topology of the MBone. Proceedings of IEEE Symposium on Information Visualization, San Francisco, California, USA, 1996.
-
(1996)
Proceedings of IEEE Symposium on Information Visualization, San Francisco, California, USA
-
-
Munzner, T.1
Hoffman, E.2
Claffy, K.3
Fenner, B.4
-
16
-
-
33749407334
-
Flow Map Layout
-
Phan, D., L. Xiao, R. Yeh, P. Hanrahan, and T. Winograd. Flow Map Layout IEEE Symposium on Information Visualization, 2005. INFOVIS 2005. pp. 219-24, 2005.
-
(2005)
IEEE Symposium on Information Visualization, 2005. INFOVIS 2005
, pp. 219-224
-
-
Phan, D.1
Xiao, L.2
Yeh, R.3
Hanrahan, P.4
Winograd, T.5
-
17
-
-
0029694754
-
LifeLines: Visualizing personal histories
-
ACM Press New York, NY, USA
-
Plaisant, C., B. Milash, A. Rose, S. Widoff, and B. Shneiderman. LifeLines: visualizing personal histories. Proceedings of the SIGCHI conference on Human factors in computing systems: common ground: ACM Press New York, NY, USA, 1996.
-
(1996)
Proceedings of the SIGCHI conference on Human factors in computing systems: Common ground
-
-
Plaisant, C.1
Milash, B.2
Rose, A.3
Widoff, S.4
Shneiderman, B.5
-
18
-
-
0028013807
-
The table lens: Merging graphical and symbolic representations in an interactive focus+ context visualization for tabular information
-
ACM Press New York, NY, USA. pp
-
Rao, R. and S. K. Card. The table lens: merging graphical and symbolic representations in an interactive focus+ context visualization for tabular information. Proceedings of the SIGCHI conference on Human factors in computing systems: celebrating interdependence: ACM Press New York, NY, USA. pp. 318-22, 1994.
-
(1994)
Proceedings of the SIGCHI conference on Human factors in computing systems: Celebrating interdependence
, pp. 318-322
-
-
Rao, R.1
Card, S.K.2
-
19
-
-
33749519234
-
-
Ren, P., Y. Gao, Z. Li, Y. Chen, and B. Watson. IDGraphs: Intrusion Detection and Analysis Using Histographs. In Proceedings of Workshop of Visualization for Computer Security, 2005.
-
Ren, P., Y. Gao, Z. Li, Y. Chen, and B. Watson. IDGraphs: Intrusion Detection and Analysis Using Histographs. In Proceedings of Workshop of Visualization for Computer Security, 2005.
-
-
-
-
20
-
-
0036265294
-
Polaris: A System for Query, Analysis, and Visualization of Multidimensional Relational Databases
-
Stolte, C., D. Tang, and P. Hanrahan. Polaris: A System for Query, Analysis, and Visualization of Multidimensional Relational Databases. IEEE Transactions on Visualization and Computer Graphics 8(1). pp. 52-65, 2002.
-
(2002)
IEEE Transactions on Visualization and Computer Graphics
, vol.8
, Issue.1
, pp. 52-65
-
-
Stolte, C.1
Tang, D.2
Hanrahan, P.3
-
23
-
-
33845261602
-
Communication-Minded Visualization: A Call to Action
-
Viégas, F. and M. Wattenberg. Communication-Minded Visualization: A Call to Action. IBM Systems Journal 45(4), 2006.
-
(2006)
IBM Systems Journal
, vol.45
, Issue.4
-
-
Viégas, F.1
Wattenberg, M.2
-
24
-
-
13944256121
-
VisFlowConnect: Netflow visualizations of link relationships for security situational awareness
-
ACM Press New York, NY, USA. pp
-
Yin, X., W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju. VisFlowConnect: netflow visualizations of link relationships for security situational awareness. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security: ACM Press New York, NY, USA. pp. 26-34, 2004.
-
(2004)
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
|