-
2
-
-
0242527443
-
Guarding the next internet frontier: Countering denial of information attacks
-
Ahamad, M., Mark, L., Lee, W., Omicienski, E., Dos Santos, A., Liu, L. and Pu, C. Guarding the Next Internet Frontier: Countering Denial of Information Attacks. New Security Paradigms Workshop, 2002.
-
(2002)
New Security Paradigms Workshop
-
-
Ahamad, M.1
Mark, L.2
Lee, W.3
Omicienski, E.4
Dos Santos, A.5
Liu, L.6
Pu, C.7
-
3
-
-
24944445652
-
Countering denial of information attacks
-
accepted, to be published
-
Conti, G. and Ahamad, M. Countering Denial of Information Attacks. IEEE Security and Privacy. (accepted, to be published).
-
IEEE Security and Privacy
-
-
Conti, G.1
Ahamad, M.2
-
4
-
-
77953737587
-
-
Air War College, United States Air Force
-
Army Battlefield Deception Operations. Air War College, United States Air Force. http://www.au.af.mil/au/awc/awcgate/army/batdecep.htm.
-
Army Battlefield Deception Operations
-
-
-
7
-
-
77953760296
-
-
Propaganda
-
Propaganda. Disinfopedia. http://www.disinfopedia.org/wiki.phtml?title= Propaganda.
-
Disinfopedia
-
-
-
12
-
-
77953784407
-
Power point is evil
-
Tufte, E. Power Point is Evil. Wired Magazine Online, http://www.wired.com/wired/archive/11.09/ppt2-pr.html.
-
Wired Magazine Online
-
-
Tufte, E.1
-
16
-
-
0028465038
-
Fourteen ways to say nothing with scientific visualization
-
Globus, A. and Raible, E. Fourteen Ways to Say Nothing with Scientific Visualization. Computer, Vol. 27, No. 7, pp. 86-88, 1994.
-
(1994)
Computer
, vol.27
, Issue.7
, pp. 86-88
-
-
Globus, A.1
Raible, E.2
-
17
-
-
0041638552
-
Twelve ways to fool the masses when giving performance results on parallel computers
-
August
-
Bailey, D. Twelve Ways to Fool the Masses When Giving Performance Results on Parallel Computers. Supercomputing Review, August 1991, pp. 54-55.
-
(1991)
Supercomputing Review
, pp. 54-55
-
-
Bailey, D.1
-
18
-
-
0030145449
-
How not to lie with visualization
-
May/June
-
Rogowitz, B., Treinish, L. and Bryson, S. How Not to Lie With Visualization. Computers in Physics, Vol. 10, No. 3, May/June 1996, pp. 268-273.
-
(1996)
Computers in Physics
, vol.10
, Issue.3
, pp. 268-273
-
-
Rogowitz, B.1
Treinish, L.2
Bryson, S.3
-
19
-
-
0003611326
-
-
Lawrence Erlbaum Associates, Hillsdale, New Jersey
-
Card, S., Morgan, T. and Newell, A. The Psychology of Human Computer Interaction. Lawrence Erlbaum Associates, Hillsdale, New Jersey, 1983.
-
(1983)
The Psychology of Human Computer Interaction
-
-
Card, S.1
Morgan, T.2
Newell, A.3
-
20
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
Miller, G. The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information. The Psychological Review, vol. 63, 1956, pp. 81-97.
-
(1956)
The Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.1
-
21
-
-
0030096113
-
Pad++ a zoomable graphical sketchpad for exploring alternate interface physics
-
Bederson, B., et al. Pad++ A Zoomable Graphical Sketchpad for Exploring Alternate Interface Physics. Journal of Visual Languages and Computing, vol. 7, no. 1, 1996, pp 3-31.
-
(1996)
Journal of Visual Languages and Computing
, vol.7
, Issue.1
, pp. 3-31
-
-
Bederson, B.1
-
24
-
-
33645218144
-
Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries
-
October, (submitted, under review)
-
Conti, G., Grizzard, J., Ahamad, M. and Owen, H. "Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries;" IEEE Symposium on Information Visualization - Workshop on Visualization for Computer Security (VizSEC), October 2005. (submitted, under review).
-
(2005)
IEEE Symposium on Information Visualization - Workshop on Visualization for Computer Security (VizSEC)
-
-
Conti, G.1
Grizzard, J.2
Ahamad, M.3
Owen, H.4
-
25
-
-
77953763917
-
Visual perception
-
From, Garland Publishing. Article available online at
-
Cook, R. Visual Perception. From Comparative Psychology: A Handbook. Garland Publishing. Article available online at http://www.pigeon.psy.tufts.edu/ ecp.htm.
-
Comparative Psychology: A Handbook
-
-
Cook, R.1
-
27
-
-
0035859107
-
Motion induced blindness
-
Bonneh, Y., Cooperman, A. and Sagi, D. Motion Induced Blindness. Nature, vol. 411, 2001, pp. 798-801.
-
(2001)
Nature
, vol.411
, pp. 798-801
-
-
Bonneh, Y.1
Cooperman, A.2
Sagi, D.3
-
28
-
-
43249104543
-
-
Department of Computer Science, North Carolina State University
-
Healey, C. Perception in Visualization. Department of Computer Science, North Carolina State University. http://www.csc.ncsu.edu/faculty/healey/PP/.
-
Perception in Visualization
-
-
Healey, C.1
-
29
-
-
0004306617
-
-
10th Edition, Prentice Hall. Summary available online at
-
Morris, C. and Maisto, A. Psychology: An Introduction. 10th Edition, Prentice Hall. Summary available online at http://cwx.prenhall.com/bookbind/ pubbooks/morris2/chapter3/medialib/summary/1.html.
-
Psychology: An Introduction
-
-
Morris, C.1
Maisto, A.2
-
30
-
-
0005230526
-
Real queasiness in virtual reality
-
November, 19
-
Hafner, K. Real Queasiness in Virtual Reality. The New York Times Online, November, 19, 1998.
-
(1998)
The New York Times Online
-
-
Hafner, K.1
-
31
-
-
77953739796
-
Cyber-defense exercise
-
Cyber-Defense Exercise. United States Military Academy. http://www.itoc.usma.edu/cdx/.
-
United States Military Academy
-
-
-
32
-
-
77953783189
-
Photosensitive epilepsy
-
Summer
-
Hardin, G. Photosensitive Epilepsy. Epilepsy Matters, Vol 9, No. 3, Summer 1998.
-
(1998)
Epilepsy Matters
, vol.9
, Issue.3
-
-
Hardin, G.1
-
33
-
-
4243116400
-
The spinning cube of potential doom
-
June
-
Lau, S. The Spinning Cube of Potential Doom. Communications of the ACM, Vol. 7, No. 46, June 2004.
-
(2004)
Communications of the ACM
, vol.7
, Issue.46
-
-
Lau, S.1
-
38
-
-
10944240574
-
Interface illusions
-
November/December
-
Elias, L. Interface Illusions. IEEE Security and Privacy, Vol. 2, No. 6, November/December 2004, pp. 66-69.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 66-69
-
-
Elias, L.1
-
39
-
-
14544292121
-
Why computer scientists should attend hacker conferences
-
March
-
Conti, G. Why Computer Scientists Should Attend Hacker Conferences. Communications of the ACM, March 2005.
-
(2005)
Communications of the ACM
-
-
Conti, G.1
|