-
1
-
-
33749520207
-
IDS RainStorm: Visualizing IDS alarms
-
DOI 10.1109/VIZSEC.2005.1532060, 1532060, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
IDS rainstorm: Visualizing IDS alarms. In VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security, Washington, DC, USA, 2005. (Pubitemid 44523242)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 1-10
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
Stasko, J.5
-
2
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
Washington DC, USA
-
R. Ball, G. A. Fink, and C. North. Home-centric visualization of network traffic for security administration. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshopon Visualization and Data Mining for Computer Security, pages 55-64, Washington DC, USA, 2004.
-
(2004)
InVizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and Data Mining for Computer Security
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
-
3
-
-
33749537716
-
Visual correlation of host processes and network traffic
-
DOI 10.1109/VIZSEC.2005.1532061, 1532061, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
F. Fischer, F. Mansmann, D. A. Keim, S. Pietzko, and M. Waldvogel. Large-scale network monitoring for visual analysis of attacks. In J. R. Goodall, G. J. Conti, and K.- L. Ma, editors, VizSEC, volume 5210 of Lecture Notes in Computer Science, pages 111-118. Springer, 2008. (Pubitemid 44523243)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 11-19
-
-
Fink, G.A.1
Muessig, P.2
North, C.3
-
4
-
-
56449095222
-
-
In J. R. Goodall, G. J. Conti, and K.-L. Ma, editors, VizSEC, volume 5210 of Lecture Notes in Computer Science, Springer
-
F. Fischer, F. Mansmann, D. A. Keim, S. Pietzko, and M. Waldvogel. Large-scale network monitoring for visualanalysis of attacks. In J. R. Goodall, G. J. Conti, and K.-L. Ma, editors, VizSEC, volume 5210 of Lecture Notes in Computer Science, pages 111-118. Springer, 2008.
-
(2008)
Large-scale network monitoring for visual alysis of attacks
, pp. 111-118
-
-
Fischer, F.1
Mansmann, F.2
Keim, D.A.3
Pietzko, S.4
Waldvogel, M.5
-
5
-
-
85035495585
-
Generalized fisheye views
-
Generalized fisheye views. SIGCHI Bulletin,17(4):16-23, 1986.
-
(1986)
SIGCHI Bulletin
, vol.17
, Issue.4
, pp. 16-23
-
-
Furnas, G.W.1
-
6
-
-
49949110337
-
The contact surface: A technique for exploring internet scale emergent behaviors
-
D. Zamboni, editor, of Lecture Notes in Computer Science, Paris, France, July , Springer
-
C. Gates and J. McHugh. The contact surface: A technique for exploring internet scale emergent behaviors. In D. Zamboni, editor, Proceedings of the Fifth Conference on the Detection of Intrusions and Malware & Vulnerability Assessment, volume 5137 of Lecture Notes in Computer Science, pages 228-246, Paris, France, July 2008. Springer.
-
(2008)
Proceedings of the Fifth Conference on the Detectionf Intrusions and Malware and Vulnerability Assessment
, vol.5137
, pp. 228-246
-
-
Gates, C.1
McHugh, J.2
-
7
-
-
33645236577
-
Focusing on context in network traffic analysis
-
J. R. Goodall, W. G. Lutters, P. Rheingans, and A. Komlodi. Focusing on context in network traffic analysis. IEEE Computer Graphics Applications, 26(2):72-80, 2006.
-
(2006)
IEEE Computer Graphics Applications
, vol.26
, Issue.2
, pp. 72-80
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
8
-
-
66249118882
-
Visualizations of flow and analytical results
-
Jan 2008., A pdf of the slides is available from the FloCon 2008 web site,21 October 2008
-
P. Groce and J. Janies. Visualizations of flow and analytical results. Powerpoint presentation at FloCon, Jan 2008. A pdf of the slides is available from the FloCon 2008 web site, http://www.cert.org/flocon/2008/ proceedings.html, as of 21 October
-
(2008)
Powerpoint Presentation at Flocon
-
-
Groce, P.1
Janies, J.2
-
9
-
-
66249083325
-
-
CRPIT, In K. Misue, K. Sugiyama, and J. Tanaka, editors, APVIS Australian Computer Society, 197
-
Y. Hideshima and H. Koike. STARMINE: A visualization system for cyber attacks. In K. Misue, K. Sugiyama, and J. Tanaka, editors, APVIS, volume 60 of CRPIT, pages 131-138. Australian Computer Society, 2006. 197
-
(2006)
STARMINE: A visualization system for cyber attacks
, vol.60
, pp. 131-138
-
-
Hideshima, Y.1
Koike, H.2
-
10
-
-
33845640864
-
Hierarchical edge bundles: Visualization of adjacency relations in hierarchical data
-
D. Holten. Hierarchical edge bundles: Visualization of adjacency relations in hierarchical data. IEEE Transactions on Visualization and Computer Graphics, 12(5):741-748,2006.
-
(2006)
IEEE Transactions on Visualization and Computer Graphics
, vol.12
, Issue.5
, pp. 741-748
-
-
Holten, D.1
-
11
-
-
33749533756
-
A user-centered look at glyph-based security visualization
-
DOI 10.1109/VIZSEC.2005.1532062, 1532062, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
A. Komlodi, P. Rheingans, U. Ayachit, J. R. Goodall, and A. Joshi. A user-centered look at glyph-based security visualization. In VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security, Washington, DC, USA, 2005. (Pubitemid 44523244)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 21-28
-
-
Komlodi, A.1
Rheingans, P.2
Ayachit, U.3
Goodall, J.R.4
Joshi, A.5
-
12
-
-
20444484611
-
NVisionIP: Netflow visualizations of system state for security situational awareness
-
Washington DC, USA
-
K. Lakkaraju, W. Yurcik, and A. J. Lee. NVisionIP: Netflow visualizations of system state for security situational awareness. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pages 65-72, Washington DC, USA, 2004.
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
13
-
-
4243116400
-
The spinning cube of potential doom
-
S. Lau. The spinning cube of potential doom. Communications of the ACM, 47(6):25-26, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 25-26
-
-
Lau, S.1
-
15
-
-
35948957403
-
Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
-
DOI 10.1109/TVCG.2007.70522
-
Mansmann, D. A. Keim, S. C. North, B. Rexroad, and D. Sheleheda. Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of securitythreats. IEEE Transactions on Visualization and Computer Graphics, 13 Paradigms, pages 3-10, Ascona, Switzerland, August 2003. (Pubitemid 350076578)
-
(2007)
IEEE Transactions on Visualization and Computer Graphics
, vol.13
, Issue.6
, pp. 1105-1112
-
-
Mansmann, F.1
Keim, D.A.2
North, S.C.3
Rexroad, B.4
Sheleheda, D.5
-
16
-
-
26444582427
-
Sets, bags, and rock and roll: Analyzing large data sets of network data
-
J. McHugh. Sets, bags, and rock and roll: Analyzing large data sets of network data. In P. Samarati, P. Y. A. Ryan, D. Gollmann, and R. Molva, editors, Proceedings of the 9th European Symposium on Research in Computer Security, volume 3193 of Lecture Notes in Computer Science, pages 407-422, Sophia Antipolis, France, September 2004.Springer. (Pubitemid 39738754)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3193
, pp. 407-422
-
-
McHugh, J.1
-
17
-
-
17644414542
-
Locality: A new paradigm for thinking about normal behavior and outsider threat
-
Ascona, Switzerland, August
-
J. McHugh and C. Gates. Locality: A new paradigm for thinking about normal behavior and outsider threat. In NSPW '03: Proceedings of the 2003 Workshop on New Security Paradigms, pages 3-10, Ascona, Switzerland, August 2003.
-
(2003)
NSPW '03: Proceedings of the 2003 Workshop on New Security Paradigms
, pp. 3-10
-
-
McHugh, J.1
Gates, C.2
-
18
-
-
49949096506
-
Situational awareness and network traffic analysis
-
volume 196 of NATO Science Series II. Mathematics, Physics, and Chemistry, Gdansk, Poland, September
-
J. McHugh, C. Gates, and D. Becknel. Situational awareness and network traffic analysis. In Proceedings of the Gdansk NATO Workshop on Cyberspace Security and Defence: Research Issues, volume 196 of NATO Science Series II. Mathematics, Physics, and Chemistry, pages 209 - 228, Gdansk, Poland, September 2004.
-
(2004)
Proceedings of the Gdansk NATO Workshop on Cyberspace Security and Defence: Research Issues
, pp. 209-228
-
-
McHugh, J.1
Gates, C.2
Becknel, D.3
-
19
-
-
20444495766
-
PortVis: A tool for port-based detection of security events
-
Washington DC, USA
-
J. McPherson, K.-L. Ma, P. Krystosk, T. Bartoletti, and M. Christensen. PortVis: A tool for port-based detection of security events. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pages73-81, Washington DC, USA, 2004
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 73-81
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
20
-
-
34250776964
-
Flamingo: Visualizing Internet traffic
-
1687547, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006
-
J. Oberheide, M. Goff, and M. Karir. Flamingo: Visualizing internet traffic. In Proceedings of the 10th IEEE/IFIP Network Operations and Management Symposium, pages 150-161, 2006. (Pubitemid 46948676)
-
(2006)
IEEE Symposium Record on Network Operations and Management Symposium
, pp. 150-161
-
-
Oberheide, J.1
Goff, M.2
Karir, M.3
-
21
-
-
84890932071
-
Visual analysis of network flow data with timelines and event plots
-
In J. R. Goodall, G. Conti, and K. L. Ma, editors, Springer,10.1007/978- 3-540-78243-8 6
-
D. Phan, J. Gerth, M. Lee, A. Paepcke, and T.Winograd. Visual analysis of network flow data with timelines and event plots. In J. R. Goodall, G. Conti, and K. L. Ma, editors, VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security, pages85-99. Springer, 2008. 10.1007/978-3-540-78243-8 6.
-
(2008)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security
, pp. 85-99
-
-
Phan, D.1
Gerth, J.2
Lee, M.3
Paepcke, A.4
Winograd, T.5
-
22
-
-
0008734185
-
To see or not to see: The Need for Attention to Perceive Changes in Scenes
-
R. A. Rensink, J. K. O'Regan, and J. J. Clark. To see or not to see: The need for attention to perceive changes in scenes. Psychological Science, 8:368-373, 1997. (Pubitemid 127455296)
-
(1997)
Psychological Science
, vol.8
, Issue.5
, pp. 368-373
-
-
Rensink, R.A.1
O'Regan, J.K.2
Clark, J.J.3
-
25
-
-
13944256121
-
VisFlowConnect: Netflow visualizations of link relationships for security situational awareness
-
Washington DC, USA
-
X. Yin, W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju. VisFlowConnect: Netflow visualizations of link relationships for security situational awareness. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington DC, USA, 2004.
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster M.Li, Y.3
Lakkaraju, K.4
|