-
2
-
-
0242414940
-
Intrusion and Misuse Detection in Large-Scale Systems
-
R. F. Erbacher, K. L. Walker, and D. A. Frincke, "Intrusion and Misuse Detection in Large-Scale Systems," IEEE Computer Graphics and Applications, vol. 22, no. 1, pp. 38-48, 2002.
-
(2002)
IEEE Computer Graphics and Applications
, vol.22
, Issue.1
, pp. 38-48
-
-
Erbacher, R.F.1
Walker, K.L.2
Frincke, D.A.3
-
6
-
-
84890932071
-
Visual Analysis of Network Flow Data with Timelines and Event Plots
-
J. R. Goodall, G. Conti and K. L. Ma, eds, pp, Springer
-
D. Phan, J. Gerth, M. Lee et al., "Visual Analysis of Network Flow Data with Timelines and Event Plots," VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security, J. R. Goodall, G. Conti and K. L. Ma, eds., pp. 85-99: Springer, 2008.
-
(2008)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security
, pp. 85-99
-
-
Phan, D.1
Gerth, J.2
Lee, M.3
-
7
-
-
84890913169
-
Putting Security in Context: Visual Correlation of Network Activity with Real-World Information
-
J. R. Goodall, G. Conti and K. L. Ma, eds, pp, Springer
-
W. A. Pike, C. Scherrer, and S. Zabriskie, "Putting Security in Context: Visual Correlation of Network Activity with Real-World Information," VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security, J. R. Goodall, G. Conti and K. L. Ma, eds., pp. 203-220: Springer, 2008.
-
(2008)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security
, pp. 203-220
-
-
Pike, W.A.1
Scherrer, C.2
Zabriskie, S.3
-
8
-
-
33645236577
-
Focusing on Context in Network Traffic Analysis
-
J. R. Goodall, W. G. Lutters, P. Rheingans et al., "Focusing on Context in Network Traffic Analysis," IEEE Computer Graphics and Applications, vol. 26, no. 2, pp. 72-80, 2006.
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
, pp. 72-80
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
-
9
-
-
77949388260
-
-
A. Komlodi, A. Sears, and E. Stanziola, Information Visualization Evaluation Review, UMBC-ISRC-2004-1, 2004.
-
A. Komlodi, A. Sears, and E. Stanziola, Information Visualization Evaluation Review, UMBC-ISRC-2004-1, 2004.
-
-
-
-
10
-
-
77949347384
-
-
M. M. Sebrechts, J. V. Cugini, S. J. Laskowski et al., Visualization of search results: a comparative evaluation of text, 2D, and 3D interfaces. pp. 3-10.
-
M. M. Sebrechts, J. V. Cugini, S. J. Laskowski et al., "Visualization of search results: a comparative evaluation of text, 2D, and 3D interfaces." pp. 3-10.
-
-
-
-
11
-
-
0034317981
-
An evaluation of space-filling information visualizations for depicting hierarchical structures
-
J. Stasko, R. Catrambone, M. Guzdial et al., "An evaluation of space-filling information visualizations for depicting hierarchical structures," International Journal of Human Computer Studies, vol. 53, no. 5, pp. 663-694, 2000.
-
(2000)
International Journal of Human Computer Studies
, vol.53
, Issue.5
, pp. 663-694
-
-
Stasko, J.1
Catrambone, R.2
Guzdial, M.3
-
13
-
-
0034316981
-
An initial examination of ease of use for 2D and 3D information visualizations of web content
-
K. Risden, M. P. Czerwinski, T. Munzner et al., "An initial examination of ease of use for 2D and 3D information visualizations of web content," International Journal of Human Computer Studies, vol. 53, no. 5, pp. 695-714, 2000.
-
(2000)
International Journal of Human Computer Studies
, vol.53
, Issue.5
, pp. 695-714
-
-
Risden, K.1
Czerwinski, M.P.2
Munzner, T.3
-
15
-
-
77949409342
-
Defending the Network: Visualizing Network Traffic for Intrusion Detection Analysis,
-
Ph. D. Dissertation, University of Maryland-Baltimore County, Department of Information Systems
-
J. R. Goodall, "Defending the Network: Visualizing Network Traffic for Intrusion Detection Analysis," Ph. D. Dissertation, University of Maryland-Baltimore County, Department of Information Systems, 2007.
-
(2007)
-
-
Goodall, J.R.1
-
19
-
-
77949357042
-
-
O. Juarez, C. Hendrickson, and J. H. Garrett, Jr., Evaluating visualizations based on the performed task. pp. 135-142.
-
O. Juarez, C. Hendrickson, and J. H. Garrett, Jr., "Evaluating visualizations based on the performed task." pp. 135-142.
-
-
-
-
21
-
-
0004257599
-
-
San Francisco, CA, USA: Morgan Kaufmann
-
J. Nielsen, Usability Engineering, San Francisco, CA, USA: Morgan Kaufmann, 1993.
-
(1993)
Usability Engineering
-
-
Nielsen, J.1
-
22
-
-
69549095933
-
Developing Expertise for Network Intrusion Detection
-
J. R. Goodall, W. G. Lutters, and A. Komlodi, "Developing Expertise for Network Intrusion Detection," Information Technology & People, vol. 22, no. 2, pp. 92-108, 2009.
-
(2009)
Information Technology & People
, vol.22
, Issue.2
, pp. 92-108
-
-
Goodall, J.R.1
Lutters, W.G.2
Komlodi, A.3
-
24
-
-
33749511398
-
An Insight-Based Longitudinal Study of Visual Analytics
-
P. Saraiya, C. North, V. Lam et al., "An Insight-Based Longitudinal Study of Visual Analytics," IEEE Transactions on Visualization and Computer Graphics, vol. 12, no. 6, pp. 1511-1522, 2006.
-
(2006)
IEEE Transactions on Visualization and Computer Graphics
, vol.12
, Issue.6
, pp. 1511-1522
-
-
Saraiya, P.1
North, C.2
Lam, V.3
|