-
1
-
-
33749531595
-
Root polar layout of internet address data for security administration
-
IEEE Computer Society
-
G. A. Fink and C. North. Root polar layout of internet address data for security administration. In VizSEC. IEEE Computer Society, 2005.
-
(2005)
VizSEC
-
-
Fink, G.A.1
North, C.2
-
2
-
-
0032257669
-
-
Daniel A. Keim and Annemarie Herrmann. The gridfit algorithm: An efficient and effective approach to visualizing large amounts of spatial data. vis, 00:181, 1998.
-
Daniel A. Keim and Annemarie Herrmann. The gridfit algorithm: An efficient and effective approach to visualizing large amounts of spatial data. vis, 00:181, 1998.
-
-
-
-
3
-
-
24344452007
-
A study of analyzing network traffic as images in real-time
-
S.S. Kim and A.L. Reddy. A study of analyzing network traffic as images in real-time. In INFOCOM, 2005.
-
(2005)
INFOCOM
-
-
Kim, S.S.1
Reddy, A.L.2
-
4
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
Philadelphia, PA, August
-
Anukool Lakhina, Mark Crovella, and Christophe Diot. Mining anomalies using traffic feature distributions. In Proceedings of SIGCOMM 2005, pages 217-228, Philadelphia, PA, August 2005.
-
(2005)
Proceedings of SIGCOMM
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
5
-
-
20444484611
-
Nvisionip: Netflow visualizations of system state for security situational awareness
-
New York, NY, USA, ACM Press
-
K. Lakkaraju, W. Yurcik, and A. J. Lee. Nvisionip: netflow visualizations of system state for security situational awareness. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 65-72, New York, NY, USA, 2004. ACM Press.
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
6
-
-
20444495766
-
Portvis: A tool for port-based detection of security events
-
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosek, Tony Bartoletti, and Marvin Christensen. Portvis: A tool for port-based detection of security events. In CCS Workshop on Visualization and Data Mining for Computer Security, 2004.
-
(2004)
CCS Workshop on Visualization and Data Mining for Computer Security
-
-
McPherson, J.1
Ma, K.-L.2
Krystosek, P.3
Bartoletti, T.4
Christensen, M.5
-
7
-
-
0038305063
-
Performance of multidimensional space-filling curves
-
New York, NY, USA, ACM Press
-
M. F. Mokbel, W. G. Aref, and I. Kamel. Performance of multidimensional space-filling curves. In GIS '02: Proceedings of the 10th ACM international symposium on Advances in geographic information systems, pages 149-154, New York, NY, USA, 2002. ACM Press.
-
(2002)
GIS '02: Proceedings of the 10th ACM international symposium on Advances in geographic information systems
, pp. 149-154
-
-
Mokbel, M.F.1
Aref, W.G.2
Kamel, I.3
-
8
-
-
0036448607
-
Case Study: Interactive Visualization for Internet Security
-
Robert J. Moorhead, Markus Gross, and Kenneth I. Joy, editors, IEEE Computer Science Press
-
Robert J. Moorhead, Markus Gross, and Kenneth I. Joy, editors. Case Study: Interactive Visualization for Internet Security. IEEE Visualization 2002 Conference, IEEE Computer Science Press, 2002.
-
(2002)
IEEE Visualization 2002 Conference
-
-
-
9
-
-
33749513452
-
A visualization methodology for characterization of network scans
-
IEEE Computer Society
-
C. Muelder, K. Ma, and T. Bartoletti. A visualization methodology for characterization of network scans. In VizSEC. IEEE Computer Society, 2005.
-
(2005)
VizSEC
-
-
Muelder, C.1
Ma, K.2
Bartoletti, T.3
-
10
-
-
33745653877
-
Interactive visualization for network and port scan detection
-
C. Muelder, K.L. Ma, and T. Bartoletti. Interactive visualization for network and port scan detection. In RAID, pages 265-283, 2005.
-
(2005)
RAID
, pp. 265-283
-
-
Muelder, C.1
Ma, K.L.2
Bartoletti, T.3
-
11
-
-
51049122540
-
-
Passive Measurement and Analysis Project, National Laboratory for Applied Network Research, December 2003
-
Passive Measurement and Analysis Project, National Laboratory for Applied Network Research. "NLANR Special Traces". http://pma.nlanr.net/ Special/, December 2003.
-
NLANR Special Traces
-
-
-
14
-
-
13944272563
-
Combining visual and automated data mining for near-real-time anomaly detection and analysis in bgp
-
New York, NY, USA, ACM Press
-
S. T. Teoh, K. Zhang, S.M. Tseng, K.L. Ma, and S. Felix Wu. Combining visual and automated data mining for near-real-time anomaly detection and analysis in bgp. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 35-44, New York, NY, USA, 2004. ACM Press.
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
, pp. 35-44
-
-
Teoh, S.T.1
Zhang, K.2
Tseng, S.M.3
Ma, K.L.4
Felix Wu, S.5
-
15
-
-
84878704906
-
Network anomography
-
Berkeley, CA, October
-
Yin Zhang, Zihui Ge, Albert Greenberg, and Matthew Roughan. Network anomography. In ACM/Usenix Internet Measurement Conference (IMC) 2005, Berkeley, CA, October 2005.
-
(2005)
ACM/Usenix Internet Measurement Conference (IMC) 2005
-
-
Zhang, Y.1
Ge, Z.2
Greenberg, A.3
Roughan, M.4
|