-
1
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
Oct. 29
-
Ball, R., Fink, G. A., & North, C. (2004, Oct. 29). Home-centric visualization of network traffic for security administration. VizSEC/DMSEC, 55-64.
-
(2004)
VizSEC/DMSEC
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
-
2
-
-
33749517393
-
Information assurance visualizations for specific stages of situational awareness and intended uses: Lessons learned
-
Oct. 26
-
D'Amico, A., & Kocka, M. (2005, Oct. 26). Information assurance visualizations for specific stages of situational awareness and intended uses: Lessons learned. VizSEC, 107-112.
-
(2005)
VizSEC
, pp. 107-112
-
-
D'Amico, A.1
Kocka, M.2
-
3
-
-
33645243542
-
User requirements and design of a visualization for intrusion detection analysis
-
June 15-17
-
Goodall, J. R. (2005, June 15-17). User requirements and design of a visualization for intrusion detection analysis. IEEE Workshop on Information Assurance and Security, 394-401.
-
(2005)
IEEE Workshop on Information Assurance and Security
, pp. 394-401
-
-
Goodall, J.R.1
-
4
-
-
21644478019
-
I know my network: Collaboration and expertise in intrusion detection
-
Goodall, J., Lutters, W., & Komlodi, A. (2004a). I know my network: collaboration and expertise in intrusion detection. CSCW, 342-345.
-
(2004)
CSCW
, pp. 342-345
-
-
Goodall, J.1
Lutters, W.2
Komlodi, A.3
-
5
-
-
85139020324
-
The work of intrusion detection: Rethinking the role of security analysts
-
Aug 6-8
-
Goodall, J., Lutters, W., & Komlodi, A. (2004b, Aug 6-8). The work of intrusion detection: Rethinking the role of security analysts. AMCIS, 1421-1427.
-
(2004)
AMCIS
, pp. 1421-1427
-
-
Goodall, J.1
Lutters, W.2
Komlodi, A.3
-
6
-
-
33749532337
-
Preserving the big picture: Visual network traffic analysis with TNV
-
Oct 26
-
Goodall, J. R., Lutters, W. G., Rheingans, P., & Komlodi, A. (2005, Oct 26). Preserving the big picture: Visual network traffic analysis with TNV. VizSEC, 47-54.
-
(2005)
VizSEC
, pp. 47-54
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
7
-
-
84869129317
-
A user-centered approach to visualizing network traffic for intrusion detection
-
Apr 2-7
-
Goodall, J. R., Ozok, A. A., Lutters, W. G., Rheingans, P., & Komlodi, A. (2005, Apr 2-7). A user-centered approach to visualizing network traffic for intrusion detection. Extended Abstracts CHI, 1403-1406.
-
(2005)
Extended Abstracts CHI
, pp. 1403-1406
-
-
Goodall, J.R.1
Ozok, A.A.2
Lutters, W.G.3
Rheingans, P.4
Komlodi, A.5
-
8
-
-
0242540448
-
Mining intrusion detection alarms for actionable knowledge
-
Jul 23-26
-
Julisch, K., & Dacier, M. (2002, Jul 23-26). Mining intrusion detection alarms for actionable knowledge. KDD, 366-375.
-
(2002)
KDD
, pp. 366-375
-
-
Julisch, K.1
Dacier, M.2
-
10
-
-
44349123500
-
-
Killcrece, G., Kossakowski, K., Ruefle, R., & Zajicek, M. (2003). State of the Practice of Computer Security Response Teams (CSIRTs) (No. CMU/SEI-2003-TR-001): Carnegie Mellon Software Engineering Institute (SEI).
-
Killcrece, G., Kossakowski, K., Ruefle, R., & Zajicek, M. (2003). State of the Practice of Computer Security Response Teams (CSIRTs) (No. CMU/SEI-2003-TR-001): Carnegie Mellon Software Engineering Institute (SEI).
-
-
-
-
11
-
-
84876779070
-
An information visualization framework for intrusion detection
-
Apr 24-29
-
Komlodi, A., Goodall, J. R., & Lutters, W. G. (2004, Apr 24-29). An information visualization framework for intrusion detection. Ext. Abstr. CHI, 1743.
-
(2004)
Ext. Abstr. CHI
, pp. 1743
-
-
Komlodi, A.1
Goodall, J.R.2
Lutters, W.G.3
-
12
-
-
20444477556
-
NVisionIP - A traffic visualization tool for security analysis of large and complex networks
-
Lakkaraju, K., Bearavolu, R., & Yurcik, W. (2003). NVisionIP - A traffic visualization tool for security analysis of large and complex networks. International Multiconference on Measurement, Modeling, and Evaluation of Computer-Communications Systems.
-
(2003)
International Multiconference on Measurement, Modeling, and Evaluation of Computer-Communications Systems
-
-
Lakkaraju, K.1
Bearavolu, R.2
Yurcik, W.3
-
13
-
-
2442480533
-
VisFlowConnect: Providing security situational awareness by visualizing network traffic flows
-
Apr 15-17
-
Yin, X., Yurcik, W., Li, Y., Lakkaraju, K., & Abad, C. (2004, Apr 15-17). VisFlowConnect: Providing security situational awareness by visualizing network traffic flows. IPCCC, 601-607.
-
(2004)
IPCCC
, pp. 601-607
-
-
Yin, X.1
Yurcik, W.2
Li, Y.3
Lakkaraju, K.4
Abad, C.5
-
14
-
-
21644488742
-
Maintaining perspective on who is the enemy in the security systems administration of computer networks
-
Yurcik, W., Barlow, J., & Rosendale, J. (2003). Maintaining perspective on who is the enemy in the security systems administration of computer networks. ACM CHI Workshop on System Administrators Are Users, Too: Designing Workspaces for Managing Internet-Scale Systems.
-
(2003)
ACM CHI Workshop on System Administrators Are Users, Too: Designing Workspaces for Managing Internet-Scale Systems
-
-
Yurcik, W.1
Barlow, J.2
Rosendale, J.3
|