-
1
-
-
0039903416
-
"Digital fears emerge after data siege in estonia"
-
Retrieved 10/10/2008
-
M. Landler and J. Markoff, "Digital Fears Emerge After Data Siege in Estonia", The New York Times, 2007, http://www.nytimes.com/2007/05/29/ technology/29estonia.html, Retrieved 10/10/2008.
-
(2007)
The New York Times
-
-
Landler, M.1
Markoff, J.2
-
2
-
-
0001907993
-
"Theoretical underpinnings of situational awareness: A critical review"
-
M.R. Endsley and D.J. Garland (eds.),Lawrence Erlbaum Associates, Mawah, NJ
-
M.R. Endsley, "Theoretical Underpinnings of Situational Awareness: A Critical Review", Situation Awareness Analysis and Measurement: Analysis and Measurement, M.R. Endsley and D.J. Garland (eds.), Lawrence Erlbaum Associates, Mawah, NJ, 2000
-
(2000)
Situation Awareness Analysis and Measurement: Analysis and Measurement
-
-
Endsley, M.R.1
-
3
-
-
34548795055
-
"Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts"
-
HFES Press
-
A. D'Amico, K. Whitley, D. Tesone, B. O'Brien, and E. Roth, "Achieving Cyber Defense Situational Awareness: A Cognitive Task Analysis of Information Assurance Analysts", Proc. of Human Factors and Ergonomics Society 49th Annual Meeting, HFES Press, 2005, 229-233.
-
(2005)
Proc. of Human Factors and Ergonomics Society 49th Annual Meeting
, pp. 229-233
-
-
Amico A.D'1
Whitley, K.2
Tesone, D.3
Brien B.O'4
Roth, E.5
-
4
-
-
34548778120
-
Visual discovery in computer network defense
-
DOI 10.1109/MCG.2007.137
-
A.D. D'Amico, J.R. Goodall, D.R. Tesone, and J.K. Kopylec, "Visual Discovery in Computer Network Defense", IEEE Computer Graphics and Applications 27(5), IEEE Press, 2007, 20-27. (Pubitemid 47434066)
-
(2007)
IEEE Computer Graphics and Applications
, vol.27
, Issue.5
, pp. 20-27
-
-
D'Amico, A.D.1
Goodall, J.R.2
Tesone, D.R.3
Kopylec, J.K.4
-
5
-
-
66249142888
-
Flow visualization using MSExcel visualization for the common man
-
Retrieved 10/10/2008
-
L. Rock and J. Brown, "Flow Visualization Using MSExcel Visualization for the Common Man", Proc. of FloCon, 2008, http://www.cert.org/flocon/2008/presentations/,Retrieved 10/10/2008.
-
(2008)
Proc. of FloCon
-
-
Rock, L.1
Brown, J.2
-
6
-
-
21644478019
-
I know my network: Collaboration and expertise in intrusion detection
-
ACM Press
-
J.R. Goodall, W.G. Lutters, and A. Komlodi, "I Know My Network: Collaboration and Expertise in Intrusion Detection", Proc. of ACM Conf. on Computer-Supported Cooperative Work (CSCW), ACM Press, 2004, 342-345.
-
(2004)
Proc. of ACM Conf. on Computer-Supported Cooperative Work (CSCW)
, pp. 342-345
-
-
Goodall, J.R.1
Lutters, W.G.2
Komlodi, A.3
-
7
-
-
20444484611
-
NVisionIP: Netflow visualizations of system state for security situational awarene
-
ACM Press
-
K. Lakkaraju, W. Yurcik, and A.J. Lee. "NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness", Proc. of ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC), ACM Press, 2004, 65-72.
-
(2004)
Proc. of ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
8
-
-
33745467523
-
Closing-the-loop: Discovery and search in security visualizations
-
DOI 10.1109/IAW.2005.1495934, 1495934, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
K. Lakkaraju, R. Bearavolu, A. Slagell, and W. Yurcik, "Closing-the-Loop: Discovery and Search in Security Visualizations", Proc. of IEEE Workshop on Information Assurance and Security (IAW), IEEE Press, 2005, 58-63 (Pubitemid 43948704)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 58-63
-
-
Lakkaraju, K.1
Bearavolu, R.2
Slagell, A.3
Yurcik, W.4
-
9
-
-
34547359962
-
FlowTag: A collaborative attack-analysis, reporting, and sharing tool for security researchers
-
DOI 10.1145/1179576.1179597, 1179597, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
C.P Lee, and J.A. Copeland, "Flowtag: A Collaborative Attack-Analysis, Reporting, and Sharing Tool for Security Researchers", Proc. of ACM workshop on Visualization for computer security (VizSEC), ACM Press, 2006, 103-108. (Pubitemid 47131419)
-
(2006)
Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 103-107
-
-
Lee, C.P.1
Copeland, J.A.2
-
10
-
-
84890932071
-
Visual analysis of network flow data with timelines and event plots
-
J.R. Goodall, G. Conti, and K.L. Ma (eds.), Springer, Berlin,Germany
-
D. Phan, J. Gerth, M. Lee, A. Paepcke, and T. Winograd, "Visual Analysis of Network Flow Data with Timelines and Event Plots", VizSEC 2007: Proc. of Workshop on Visualization for Computer Security, J.R. Goodall, G. Conti, and K.L. Ma (eds.), Springer, Berlin,Germany 2007, 85-99.
-
(2007)
VizSEC 2007: Proc. of Workshop on Visualization for Computer Security
, pp. 85-99
-
-
Phan, D.1
Gerth, J.2
Lee, M.3
Paepcke, A.4
Winograd, T.5
|