-
1
-
-
33749520207
-
IDS RainStorm: Visualizing IDS Alarms
-
on Visualization for Computer Security October
-
Abdullah, K., Lee, C., Conti, G., Copeland, J., Stasko, J.: IDS RainStorm: Visualizing IDS Alarms. In: IEEE Wkshp. on Visualization for Computer Security (October 2005)
-
(2005)
IEEE Wkshp
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.4
Stasko, J.5
-
3
-
-
20444438039
-
Passive Visual Fingerprinting of Network Attack Tools
-
on Visualization and Data Mining for Computer Security October
-
Conti, G., Abdullah, K.: Passive Visual Fingerprinting of Network Attack Tools. In: ACM Wkshp. on Visualization and Data Mining for Computer Security (October 2004)
-
(2004)
ACM Wkshp
-
-
Conti, G.1
Abdullah, K.2
-
4
-
-
33645218144
-
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries
-
on Visualization for Computer Security October
-
Conti, G., Grizzard, J., Ahamad, M., Owen, H.: Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. In: IEEE Wkshp. on Visualization for Computer Security (October 2005)
-
(2005)
IEEE Wkshp
-
-
Conti, G.1
Grizzard, J.2
Ahamad, M.3
Owen, H.4
-
6
-
-
33645213060
-
Visual Correlation of Network Alerts
-
March
-
Foresti, S., Agutter, J., Livnat, Y., Moon, S., Erbacher, R.: Visual Correlation of Network Alerts. IEEE Computer Graphics and Applications 26(2) (March 2006)
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
-
-
Foresti, S.1
Agutter, J.2
Livnat, Y.3
Moon, S.4
Erbacher, R.5
-
7
-
-
0034274870
-
An Open Graph Visualization System and Its Applications to Software Engineering
-
August
-
Gansner, E.R., North, S.C.: An Open Graph Visualization System and Its Applications to Software Engineering. Software: Practice and Experience 30(11) (August 2000)
-
(2000)
Software: Practice and Experience
, vol.30
, Issue.11
-
-
Gansner, E.R.1
North, S.C.2
-
9
-
-
33645236577
-
Focusing on Context in Network Traffic Analysis
-
March
-
Goodall, J.R., Lutters, W.G., Rheingans, P., Komlodi, A.: Focusing on Context in Network Traffic Analysis. IEEE Computer Graphics and Applications 26(2) (March 2006)
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
12
-
-
33749522392
-
Visual Firewall: Real-time Network Security Monitor
-
on Visualization for Computer Security October
-
Lee, C., Trost, J., Gibbs, N., Beyah, R., Copeland, J.A.: Visual Firewall: Real-time Network Security Monitor. In: IEEE Wkshp. on Visualization for Computer Security (October 2005)
-
(2005)
IEEE Wkshp
-
-
Lee, C.1
Trost, J.2
Gibbs, N.3
Beyah, R.4
Copeland, J.A.5
-
13
-
-
38149100531
-
-
Libpcap format, wiki.wireshark.org/Development/LibpcapFileFormat
-
Libpcap format, wiki.wireshark.org/Development/LibpcapFileFormat
-
-
-
-
14
-
-
38149116447
-
Perl and the Tk Extension
-
Lidie, S.: Perl and the Tk Extension. The Perl Journal 1(1) (1996)
-
(1996)
The Perl Journal
, vol.1
, Issue.1
-
-
Lidie, S.1
-
15
-
-
20444486258
-
CyberSeer: 3D Audio-Visual Immersion for Network Security and Management
-
on Visualization and Data Mining for Computer Security October
-
Papadopoulos, C., Kyriakakis, C., Sawchuk, A., He, X.: CyberSeer: 3D Audio-Visual Immersion for Network Security and Management. In: ACM Wkshp. on Visualization and Data Mining for Computer Security (October 2004)
-
(2004)
ACM Wkshp
-
-
Papadopoulos, C.1
Kyriakakis, C.2
Sawchuk, A.3
He, X.4
-
16
-
-
38149141831
-
-
Sandstrom, TA., Henze, C., Levit, C.: The Hyperwall. In: 1st Intl. Conf. on Coordinated and Multiple Views in Exploratory Visualization (2003)
-
Sandstrom, TA., Henze, C., Levit, C.: The Hyperwall. In: 1st Intl. Conf. on Coordinated and Multiple Views in Exploratory Visualization (2003)
-
-
-
-
17
-
-
84885891907
-
-
IETF Internet Draft July
-
Trammell, B., Boschi, E., Mark, L., Zseby, T., Wagner, A.: An IPFIX-Based File Format. IETF Internet Draft (July 2007)
-
(2007)
An IPFIX-Based File Format
-
-
Trammell, B.1
Boschi, E.2
Mark, L.3
Zseby, T.4
Wagner, A.5
-
18
-
-
21944457574
-
A Comprehensive Approach to Intrusion Detection Alert Correlation
-
July
-
Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. on Dependable and Secure Computing 1(3) (July 2004)
-
(2004)
IEEE Trans. on Dependable and Secure Computing
, vol.1
, Issue.3
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
19
-
-
84904883732
-
Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme
-
Xu, J., Fan, J., Ammar, M.H., Moon, S.B.: Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme. In: 10th IEEE Intl. Conf. on Network Protocols (November 2002)
-
(2002)
10th IEEE Intl. Conf. on Network Protocols (November
-
-
Xu, J.1
Fan, J.2
Ammar, M.H.3
Moon, S.B.4
|