-
1
-
-
35348879681
-
-
Cisco Systems NetFlow Services Export Version 9, http://www.ietf.org/rfc/ rfc3954.txt, 2004.
-
Cisco Systems NetFlow Services Export Version 9, http://www.ietf.org/rfc/ rfc3954.txt, 2004.
-
-
-
-
2
-
-
35348867373
-
-
Network- vs. Host-based Intrusion Detection http://www.vigilar.com/ wpsaSS/network_vs_hostbased_ ids.pdf, ISS: Internet Secruity Systems white paper, 1998.
-
Network- vs. Host-based Intrusion Detection http://www.vigilar.com/ wpsaSS/network_vs_hostbased_ ids.pdf, ISS: Internet Secruity Systems white paper, 1998.
-
-
-
-
3
-
-
33749520207
-
IDS RainStorm: Visualizing IDS Alarms
-
Abdullah, K., Lee, C., Conti, G., Copeland, J. and Stasko, J., IDS RainStorm: Visualizing IDS Alarms. VizSec/DMSEC, (2005), 1-10.
-
(2005)
VizSec/DMSEC
, pp. 1-10
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.4
Stasko, J.5
-
4
-
-
0033644990
-
Guidelines for Using Multiple Views in Information Visualization
-
Baldonado, M., Woodruff, A. and Kuchinsky, A., Guidelines for Using Multiple Views in Information Visualization. Proc. A VI, (2000), 110-119.
-
(2000)
Proc. A VI
, pp. 110-119
-
-
Baldonado, M.1
Woodruff, A.2
Kuchinsky, A.3
-
5
-
-
20444447760
-
Home-centric Visualization of Network Traffic for Security Administration
-
Ball, R., Fink, G.A. and North, C., Home-centric Visualization of Network Traffic for Security Administration. VizSEC/DMSEC, (2004), 55-64.
-
(2004)
VizSEC/DMSEC
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
-
6
-
-
0035757555
-
Focus plus Context Screens: Combining Display Technology with Visualization Techniques
-
Baudisch, P., Good, N. and Stewart, P., Focus plus Context Screens: Combining Display Technology with Visualization Techniques. UIST, (2001), 31-40.
-
(2001)
UIST
, pp. 31-40
-
-
Baudisch, P.1
Good, N.2
Stewart, P.3
-
7
-
-
33749517393
-
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned
-
D'Amico, A. and Kocka, M., Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned. VizSEC, (2005), 107-112.
-
(2005)
VizSEC
, pp. 107-112
-
-
D'Amico, A.1
Kocka, M.2
-
9
-
-
21644478019
-
I Know My Network: Collaboration and Expertise in Intrusion Detection
-
Goodall, J.R., Lutters, W.G. and Komlodi, A., I Know My Network: Collaboration and Expertise in Intrusion Detection. CSCW, (2004), 342-345.
-
(2004)
CSCW
, pp. 342-345
-
-
Goodall, J.R.1
Lutters, W.G.2
Komlodi, A.3
-
10
-
-
85139020324
-
The Work of Intrusion Detection: Rethinking the Role of Security Analysts
-
Goodall, J.R., Lutters, W.G. and Komlodi, A., The Work of Intrusion Detection: Rethinking the Role of Security Analysts. AMCIS, (2004), 1421-1427.
-
(2004)
AMCIS
, pp. 1421-1427
-
-
Goodall, J.R.1
Lutters, W.G.2
Komlodi, A.3
-
11
-
-
33749532337
-
Preserving the Big Picture: Visual Network Traffic Analysis with TNV
-
IEEE
-
Goodall, J.R., Lutters, W.G., Rheingans, P. and Komlodi, A., Preserving the Big Picture: Visual Network Traffic Analysis with TNV. VizSEC, (2005), IEEE, 47-54.
-
(2005)
VizSEC
, pp. 47-54
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
12
-
-
84869129317
-
A User-Centered Approach to Visualizing Network Traffic for Intrusion Detection
-
Goodall, J.R., Ozok, A.A., Lutters, W.G., Rheingans, P. and Komlodi, A., A User-Centered Approach to Visualizing Network Traffic for Intrusion Detection. Extended Abstracts of CHI, (2005), 1403-1406.
-
(2005)
Extended Abstracts of CHI
, pp. 1403-1406
-
-
Goodall, J.R.1
Ozok, A.A.2
Lutters, W.G.3
Rheingans, P.4
Komlodi, A.5
-
13
-
-
84979828766
-
Navigation Patterns and Usability of Zoomable User Interfaces with and without and Overview
-
Hombaek, K., Bederson, B. and Plaisant, K. Navigation Patterns and Usability of Zoomable User Interfaces with and without and Overview. ACM TOCHI, 9(4), 362-389.
-
ACM TOCHI
, vol.9
, Issue.4
, pp. 362-389
-
-
Hombaek, K.1
Bederson, B.2
Plaisant, K.3
-
14
-
-
0035040276
-
Reading of Electronic Documents: The Usability of Linear, Fisheye, and Overview+detail Interfaces
-
Hornbaek, K. and Frokjaer, E., Reading of Electronic Documents: The Usability of Linear, Fisheye, and Overview+detail Interfaces. CHI, (2001), 293-300.
-
(2001)
CHI
, pp. 293-300
-
-
Hornbaek, K.1
Frokjaer, E.2
-
15
-
-
0242540448
-
Mining Intrusion Detection Alarms for Actionable Knowledge
-
Julisch, K. and Dacier, M., Mining Intrusion Detection Alarms for Actionable Knowledge. KDD, (2002), 366-375.
-
(2002)
KDD
, pp. 366-375
-
-
Julisch, K.1
Dacier, M.2
-
16
-
-
35348877203
-
Security Administration Tools and Practices
-
Cranon, L. and Garfinkel, S. eds, O'Reilly, Beijing
-
Kandogan, E. and Haber, E. Security Administration Tools and Practices, in Cranon, L. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use, O'Reilly, Beijing, 2005, 357-376.
-
(2005)
Security and Usability: Designing Secure Systems that People Can Use
, pp. 357-376
-
-
Kandogan, E.1
Haber, E.2
-
17
-
-
0042262063
-
Visual Exploration of Large Data Sets
-
Keim, D.A. Visual Exploration of Large Data Sets. Communications of the ACM, 44 (8), 38-44.
-
Communications of the ACM
, vol.44
, Issue.8
, pp. 38-44
-
-
Keim, D.A.1
-
18
-
-
33646162672
-
-
CSIRTs, Carnegie Mellon Software Engineering Institute SEI
-
Killcrece, G., Kossakowski, K., Ruefle, R. and Zajicek, M. State of the Practice of Computer Security Response Teams (CSIRTs), Carnegie Mellon Software Engineering Institute (SEI), 2003.
-
(2003)
State of the Practice of Computer Security Response Teams
-
-
Killcrece, G.1
Kossakowski, K.2
Ruefle, R.3
Zajicek, M.4
-
19
-
-
84876779070
-
An Information Visualization Framework for Intrusion Detection
-
Komlodi, A., Goodall, J.R. and Lutters, W.G., An Information Visualization Framework for Intrusion Detection. Extended Abstracts of CHI, (2004), 1743.
-
(2004)
Extended Abstracts of CHI
, pp. 1743
-
-
Komlodi, A.1
Goodall, J.R.2
Lutters, W.G.3
-
20
-
-
20444484611
-
NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness
-
Lakkaraju, K., Yurcik, W. and Lee, A.J., NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness. VizSec/DMSEC, (2004), 65-72.
-
(2004)
VizSec/DMSEC
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
21
-
-
20444495766
-
-
McPherson, J., Ma, K., Krystosk, P., Bartoletti, T. and Christensen, M., PortVis: A Tool for Port-Based Detection of Security Events. VizSEC/DMSEC, (Washington, DC, 2004), 73-81.
-
McPherson, J., Ma, K., Krystosk, P., Bartoletti, T. and Christensen, M., PortVis: A Tool for Port-Based Detection of Security Events. VizSEC/DMSEC, (Washington, DC, 2004), 73-81.
-
-
-
-
22
-
-
0029274281
-
Image-Browser Taxonomy and Guidelines for Designers
-
Plaisant, C., Carr, D. and Shneiderman, B. Image-Browser Taxonomy and Guidelines for Designers. IEEE Software, 12 (2), 21-32.
-
IEEE Software
, vol.12
, Issue.2
, pp. 21-32
-
-
Plaisant, C.1
Carr, D.2
Shneiderman, B.3
-
24
-
-
13944256121
-
VisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness
-
Yin, X., Yurcik, W., Treaster, M., Li, Y. and Lakkaraju, K., VisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness. VizSec/DMSEC, (2004), 26-34.
-
(2004)
VizSec/DMSEC
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
-
25
-
-
21644488742
-
Maintaining Perspective on Who is the Enemy in the Security Systems Administration of Computer Networks
-
Yurcik, W., Barlow, J. and Rosendale, J., Maintaining Perspective on Who is the Enemy in the Security Systems Administration of Computer Networks. CHI Workshop on System Administrators Are Users, Too: Designing Workspaces for Managing Internet-Scale Systems, (2003).
-
(2003)
CHI Workshop on System Administrators Are Users, Too: Designing Workspaces for Managing Internet-Scale Systems
-
-
Yurcik, W.1
Barlow, J.2
Rosendale, J.3
|