-
1
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
Ball, R., Fink, G.A., North, C.: Home-centric visualization of network traffic for security administration. In: Proc. Workshop on Visualization and Data Mining for Computer Security (VIZSEC/DMSEC), pp. 55-64 (2004)
-
(2004)
Proc. Workshop on Visualization and Data Mining for Computer Security (VIZSEC/DMSEC)
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
-
2
-
-
34548201161
-
-
Barghouti, N.S., Mocenigo, J., Lee, W.: Grappa: A GRAPh PAckage in Java. In: DiBattista, G. (ed.) GD 1997. LNCS, 1353, pp. 336-343. Springer, Heidelberg (1997)
-
Barghouti, N.S., Mocenigo, J., Lee, W.: Grappa: A GRAPh PAckage in Java. In: DiBattista, G. (ed.) GD 1997. LNCS, vol. 1353, pp. 336-343. Springer, Heidelberg (1997)
-
-
-
-
3
-
-
0030406791
-
A linear iteration time layout algorithm for visualising high-dimensional data
-
Chalmers, M.: A linear iteration time layout algorithm for visualising high-dimensional data. In: Proc. Conference on Visualization (VIS), pp. 127-132 (1996)
-
(1996)
Proc. Conference on Visualization (VIS)
, pp. 127-132
-
-
Chalmers, M.1
-
4
-
-
56449116928
-
-
No Starch Press, San Francisco
-
Conti, G.: Security Data Visualization. No Starch Press, San Francisco (2007), http://www.rumint.org
-
(2007)
Security Data Visualization
-
-
Conti, G.1
-
5
-
-
33645624280
-
-
Di Battista, G., Mariani, F., Patrignani, M., Pizzonia, M.: Bgplay: A system for visualizing the interdomain routing evolution. In: Liotta, G. (ed.) GD 2003. LNCS, 1353, pp. 295-306. Springer, Heidelberg (2003)
-
Di Battista, G., Mariani, F., Patrignani, M., Pizzonia, M.: Bgplay: A system for visualizing the interdomain routing evolution. In: Liotta, G. (ed.) GD 2003. LNCS, vol. 1353, pp. 295-306. Springer, Heidelberg (2003)
-
-
-
-
6
-
-
0001070640
-
A heuristic for graph drawing
-
Eades, P.: A heuristic for graph drawing. Congr. Numer. 42, 149-160 (1984)
-
(1984)
Congr. Numer
, vol.42
, pp. 149-160
-
-
Eades, P.1
-
7
-
-
4544373206
-
Graphviz and dynagraph - static and dynamic graph drawing tools
-
Springer, Heidelberg
-
Ellson, J., Gansner, E.R., Koutsofios, L., North, S.C., Woodhull, G.: Graphviz and dynagraph - static and dynamic graph drawing tools. In: Graph Drawing Software, pp. 127-148. Springer, Heidelberg (2003)
-
(2003)
Graph Drawing Software
, pp. 127-148
-
-
Ellson, J.1
Gansner, E.R.2
Koutsofios, L.3
North, S.C.4
Woodhull, G.5
-
8
-
-
0026257928
-
Graph drawing by force-directed placement
-
Fruchterman, T., Reingold, E.: Graph drawing by force-directed placement. Softw. - Pract. Exp. 21(11), 1129-1164 (1991)
-
(1991)
Softw. - Pract. Exp
, vol.21
, Issue.11
, pp. 1129-1164
-
-
Fruchterman, T.1
Reingold, E.2
-
10
-
-
56449101827
-
-
Heitzmann, A., Palazzi, B., Papamanthou, C., Tamassia, R.: Effective visualization of file system access-control. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, 5210, pp. 18-25. Springer, Heidelberg (2008)
-
Heitzmann, A., Palazzi, B., Papamanthou, C., Tamassia, R.: Effective visualization of file system access-control. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol. 5210, pp. 18-25. Springer, Heidelberg (2008)
-
-
-
-
11
-
-
85032279305
-
Tree maps: A space-filling approach to the visualization of hierarchical information structures
-
Johnson, B., Shneiderman, B.: Tree maps: A space-filling approach to the visualization of hierarchical information structures. In: Proc. Conference on Visualization (VIS), pp. 284-291 (1991)
-
(1991)
Proc. Conference on Visualization (VIS)
, pp. 284-291
-
-
Johnson, B.1
Shneiderman, B.2
-
12
-
-
68749084400
-
Graph-based monitoring of host behavior for network security
-
Mansmann, F., Meier, L., Keim, D.: Graph-based monitoring of host behavior for network security. In: Proc. Visualization for Cyper Security (VIZSEC), pp. 187-202 (2007)
-
(2007)
Proc. Visualization for Cyper Security (VIZSEC)
, pp. 187-202
-
-
Mansmann, F.1
Meier, L.2
Keim, D.3
-
13
-
-
56449083043
-
Information visualization for rule-based resource access control
-
Montemayor, J., Freeman, A., Gersh, J., Llanso, T., Patrone, D.: Information visualization for rule-based resource access control. In: Proc. of Int. Symposium on Usable Privacy and Security (SOUPS) (2006)
-
(2006)
Proc. of Int. Symposium on Usable Privacy and Security (SOUPS)
-
-
Montemayor, J.1
Freeman, A.2
Gersh, J.3
Llanso, T.4
Patrone, D.5
-
15
-
-
68749114850
-
-
Noack, A.: An energy model for visual graph clustering. In: Liotta, G. (ed.) GD 2003. LNCS, 1353, pp. 425-436. Springer, Heidelberg (2003)
-
Noack, A.: An energy model for visual graph clustering. In: Liotta, G. (ed.) GD 2003. LNCS, vol. 1353, pp. 425-436. Springer, Heidelberg (2003)
-
-
-
-
16
-
-
33749520206
-
Multiple coordinated views for network attack graphs
-
Noel, S., Jacobs, M., Kalapa, P., Jajodia, S.: Multiple coordinated views for network attack graphs. In: Proc. Visualization for Cyber Security (VIZSEC), pp. 99-106 (2005)
-
(2005)
Proc. Visualization for Cyber Security (VIZSEC)
, pp. 99-106
-
-
Noel, S.1
Jacobs, M.2
Kalapa, P.3
Jajodia, S.4
-
18
-
-
34547282853
-
VAST: Visualizing autonomous system topology
-
Oberheide, J., Karir, M., Blazakis, D.: VAST: Visualizing autonomous system topology. In: Proc. Visualization for Cyber Security (VIZSEC), pp. 71-80 (2006)
-
(2006)
Proc. Visualization for Cyber Security (VIZSEC)
, pp. 71-80
-
-
Oberheide, J.1
Karir, M.2
Blazakis, D.3
-
19
-
-
34547254013
-
BGP Eye: A new visualization tool for realtime detection and analysis of BGP anomalies
-
Teoh, S.T., Ranjan, S., Nucci, A., Chuah, C.N.: BGP Eye: a new visualization tool for realtime detection and analysis of BGP anomalies. In: Proc. Visualization for Cyber Security (VIZSEC), pp. 81-90 (2006)
-
(2006)
Proc. Visualization for Cyber Security (VIZSEC)
, pp. 81-90
-
-
Teoh, S.T.1
Ranjan, S.2
Nucci, A.3
Chuah, C.N.4
-
21
-
-
68749090615
-
-
Tölle, J., Niggermann, O.: Supporting intrusion detection by graph clustering and graph drawing. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, 1907. Springer, Heidelberg (2000)
-
Tölle, J., Niggermann, O.: Supporting intrusion detection by graph clustering and graph drawing. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907. Springer, Heidelberg (2000)
-
-
-
-
23
-
-
33749536087
-
Visualization of automated trust negotiation
-
Yao, D., Shin, M., Tamassia, R., Winsborough, W.H.: Visualization of automated trust negotiation. In: Proc. Visualization for Cyber Security (VIZSEC), pp. 65-74 (2005)
-
(2005)
Proc. Visualization for Cyber Security (VIZSEC)
, pp. 65-74
-
-
Yao, D.1
Shin, M.2
Tamassia, R.3
Winsborough, W.H.4
-
24
-
-
13944256121
-
VisFlowConnect: Netflow visualizations of link relationships for security situational awareness
-
Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: VisFlowConnect: Netflow visualizations of link relationships for security situational awareness. In: Proc. Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC), pp. 26-34 (2004)
-
(2004)
Proc. Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
|