-
1
-
-
20444438039
-
Passive visual fingerprinting of network attack tools
-
ACM, New York, NY, USA
-
Conti, G., Abdullah, K.: Passive visual fingerprinting of network attack tools. In: VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 45-54. ACM, New York, NY, USA (2004).
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 45-54
-
-
Conti, G.1
Abdullah, K.2
-
2
-
-
0027553807
-
A technique for drawing directed graphs
-
Gansner E. R., Koutsofios E., North S. C., Phong Vo K.: A technique for drawing directed graphs. IEEE Trans. Softw. Eng. 19, 214-230 (1993).
-
(1993)
IEEE Trans. Softw. Eng.
, vol.19
, pp. 214-230
-
-
Gansner, E.R.1
Koutsofios, E.2
North, S.C.3
Phong, V.K.4
-
3
-
-
0028728675
-
Visualizing multidimensional (multivariate) data and relations
-
IEEE Computer Society Press, Los Alamitos, CA, USA
-
Grinstein, G., Mihalisin, T., Hinterberger, H., Inselberg, A.: Visualizing multidimensional (multivariate) data and relations. In: VIS '94: Proceedings of the Conference on Visualization '94, pp. 404-409. IEEE Computer Society Press, Los Alamitos, CA, USA (1994).
-
(1994)
VIS '94: Proceedings of the Conference on Visualization '94
, pp. 404-409
-
-
Grinstein, G.1
Mihalisin, T.2
Hinterberger, H.3
Inselberg, A.4
-
4
-
-
84943817322
-
Error detecting and error correcting codes
-
Hamming R.: Error detecting and error correcting codes. Bell Syst. Tech. J. 29, 147-160 (1950).
-
(1950)
Bell Syst. Tech. J.
, vol.29
, pp. 147-160
-
-
Hamming, R.1
-
5
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
USENIX Association, Berkeley, CA, USA
-
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1-9. USENIX Association, Berkeley, CA, USA (2008).
-
(2008)
LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
6
-
-
0033281214
-
The automated multidimensional detective
-
IEEE Computer Society, Washington, DC, USA
-
Inselberg, A., Avidan, T.: The automated multidimensional detective. In: INFOVIS '99: Proceedings of the 1999 IEEE Symposium on Information Visualization, p. 112. IEEE Computer Society, Washington, DC, USA (1999).
-
(1999)
INFOVIS '99: Proceedings of the 1999 IEEE Symposium on Information Visualization
, pp. 112
-
-
Inselberg, A.1
Avidan, T.2
-
7
-
-
0034592946
-
Classification and visualization for high-dimensional data
-
ACM, New York, NY, USA
-
Inselberg, A., Avidan, T.: Classification and visualization for high-dimensional data. In: KDD '00: Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 370-374. ACM, New York, NY, USA (2000).
-
(2000)
KDD '00: Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 370-374
-
-
Inselberg, A.1
Avidan, T.2
-
8
-
-
0013592372
-
Parallel coordinates for visualizing multi-dimensional geometry
-
Springer, New York, NY, USA
-
Inselberg, A., Dimsdale, B.: Parallel coordinates for visualizing multi-dimensional geometry. In: CG International '87 on Computer Graphics 1987, pp. 25-44. Springer, New York, NY, USA (1987).
-
(1987)
CG International '87 on Computer Graphics 1987
, pp. 25-44
-
-
Inselberg, A.1
Dimsdale, B.2
-
9
-
-
0028419955
-
Multidimensional lines ii: Proximity and applications
-
Inselberg A., Dimsdale B.: Multidimensional lines ii: proximity and applications. SIAM J. Appl. Math. 54(2), 578-596 (1994).
-
(1994)
SIAM J. Appl. Math.
, vol.54
, Issue.2
, pp. 578-596
-
-
Inselberg, A.1
Dimsdale, B.2
-
10
-
-
25144437707
-
Binary codes capable of correcting deletions, insertions, and reversals
-
Levenshtein, V. I.: Binary codes capable of correcting deletions, insertions, and reversals. Tech. Rep. 8 (1966).
-
(1966)
Tech. Rep.
, pp. 8
-
-
Levenshtein, V.I.1
-
11
-
-
3142552643
-
A key recovery attack on the 802.11b wired equivalent privacy protocol (wep)
-
Stubblefield A., Ioannidis J., Rubin A. D.: A key recovery attack on the 802. 11b wired equivalent privacy protocol (wep). ACM Trans. Inf. Syst. Secur. 7(2), 319-332 (2004).
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.2
, pp. 319-332
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
|