-
1
-
-
33749520207
-
IDS RainStorm: Visualizing IDS Alarms
-
IEEE Computer Society, Washington, DC, DOI=http://dx.doi.org/10.1109/ VIZSEC.2005.8
-
Abdullah, K., Lee, C., Conti, G., Copeland, J. A., and Stasko, J. 2005. IDS RainStorm: Visualizing IDS Alarms. In Proceedings of the IEEE Workshops on Visualization For Computer Security (October 26 - 26, 2005). VIZSEC. IEEE Computer Society, Washington, DC, 1. DOI=http://dx.doi.org/10.1109/VIZSEC.2005.8
-
(2005)
Proceedings of the IEEE Workshops on Visualization for Computer Security (October 26 - 26, 2005). VIZSEC
, pp. 1
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
Stasko, J.5
-
2
-
-
34047124757
-
OWL Web Ontology Language Reference
-
10 February 2004. Available at
-
Bechhofer, S., van Harmelen, F., Hendler, J., Horrocks, I., McGuinness, D. L., Patel-Schneider, P. F., and Stein, L. A. 2004. OWL Web Ontology Language Reference. W3C Recommendation, 10 February 2004. Available at http://www.w3.org/TR/owl-ref/
-
(2004)
W3C Recommendation
-
-
Bechhofer, S.1
Van Harmelen, F.2
Hendler, J.3
Horrocks, I.4
McGuinness, D.L.5
Patel-Schneider, P.F.6
Stein, L.A.7
-
3
-
-
4344704797
-
Toolkit Design for Interactive Structured Graphics
-
August 2004, DOI=10.1109/TSE.2004.44 http://dx.doi.org/10.1109/TSE.2004. 44
-
Bederson, B. B., Grossjean, J., and Meyer, J. 2004. Toolkit Design for Interactive Structured Graphics. IEEE Trans. Softw. Eng. 30, 8 (August 2004), 535-546. DOI=10.1109/TSE.2004.44 http://dx.doi.org/10.1109/TSE.2004.44
-
(2004)
IEEE Trans. Softw. Eng.
, vol.30
, Issue.8
, pp. 535-546
-
-
Bederson, B.B.1
Grossjean, J.2
Meyer, J.3
-
5
-
-
77957839092
-
Bubble Sets: Revealing Set Relations with Isocontours over Existing Visualizations
-
Nov. 2009, DOI=http://dx.doi.org/10.1109/TVCG.2009.122
-
Collins, C., Penn, G., and Carpendale, S. 2009. Bubble Sets: Revealing Set Relations with Isocontours over Existing Visualizations. IEEE Transactions on Visualization and Computer Graphics 15, 6 (Nov. 2009), 1009-1016. DOI=http://dx.doi.org/10.1109/TVCG.2009.122
-
(2009)
IEEE Transactions on Visualization and Computer Graphics
, vol.15
, Issue.6
, pp. 1009-1016
-
-
Collins, C.1
Penn, G.2
Carpendale, S.3
-
6
-
-
4444266989
-
Prefixpreserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
-
October 2004, Elsevier
-
Fan, J., Xu, J., Ammar, M. H., and Moon, S. B. 2004. Prefixpreserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Computer Networks, Volume 46, Issue 2 (October 2004), 253-272, Elsevier.
-
(2004)
Computer Networks
, vol.46
, Issue.2
, pp. 253-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.H.3
Moon, S.B.4
-
8
-
-
85139020324
-
The Work of Intrusion Detection: Rethinking the Role of Security Analysts
-
AIS Press, 2004
-
Goodall, J. R., Lutters, W.G., and Komlodi, A. 2004. The Work of Intrusion Detection: Rethinking the Role of Security Analysts. Proceedings of the Americas Conference on Information Systems (AMCIS), AIS Press, 2004, 1421-1427.
-
(2004)
Proceedings of the Americas Conference on Information Systems (AMCIS)
, pp. 1421-1427
-
-
Goodall, J.R.1
Lutters, W.G.2
Komlodi, A.3
-
9
-
-
77949820654
-
Characterizing Users' Visual Analytic Activity for Insight Provenance
-
Columbus, Ohio (2008)
-
Gotz, D. and Zhou, M. 2008. Characterizing Users' Visual Analytic Activity for Insight Provenance. IEEE Visual Analytics Science and Technology (VAST), Columbus, Ohio (2008).
-
(2008)
IEEE Visual Analytics Science and Technology (VAST)
-
-
Gotz, D.1
Zhou, M.2
-
11
-
-
0034446870
-
Explaining collaborative filtering recommendations
-
ACM, New York, NY, DOI= http://doi.acm.org/10.1145/358916.358995
-
Herlocker, J. L., Konstan, J. A., and Riedl, J. 2000. Explaining collaborative filtering recommendations. In Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work (Philadelphia, Pennsylvania, United States). CSCW '00. ACM, New York, NY, 241-250. DOI= http://doi.acm.org/ 10.1145/358916.358995
-
(2000)
Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work (Philadelphia, Pennsylvania, United States). CSCW '00
, pp. 241-250
-
-
Herlocker, J.L.1
Konstan, J.A.2
Riedl, J.3
-
12
-
-
20444456753
-
SnortView: Visualization system of snort logs
-
ACM, New York, NY, DOI=http://doi.acm.org/10.1145/1029208.1029232
-
Koike, H. and Ohno, K. 2004. SnortView: visualization system of snort logs. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining For Computer Security (Washington DC, USA, October 29 - 29, 2004). VizSEC/DMSEC '04. ACM, New York, NY, 143-147. DOI=http://doi.acm.org/10.1145/1029208.1029232
-
(2004)
Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (Washington DC, USA, October 29 - 29, 2004). VizSEC/DMSEC '04
, pp. 143-147
-
-
Koike, H.1
Ohno, K.2
-
13
-
-
84876779070
-
An Information Visualization Framework for Intrusion Detection
-
ACM, New York, NY, DOI=http://doi.acm.org/10.1145/985921.1062935
-
Komlodi, A., Goodall, J. R., and Lutters, W. G. 2004. An Information Visualization Framework for Intrusion Detection. In CHI '04 Extended Abstracts on Human Factors in Computing Systems (Vienna, Austria, April 24 - 29, 2004). CHI '04. ACM, New York, NY, 1743. DOI=http://doi.acm.org/10.1145/985921.1062935
-
(2004)
CHI '04 Extended Abstracts on Human Factors in Computing Systems (Vienna, Austria, April 24 - 29, 2004). CHI '04
, pp. 1743
-
-
Komlodi, A.1
Goodall, J.R.2
Lutters, W.G.3
-
15
-
-
33645243543
-
A Visualization Paradigm for Network Intrusion Detection
-
IEEE CS Press, 2005
-
Livnat, Y., Agutter, J., Moon, S., Erbacher, R. F., and Foresti, S. 2005. A Visualization Paradigm for Network Intrusion Detection. Proc. IEEE Workshop on Information Assurance and Security. IEEE CS Press, 2005, pp. 92-99.
-
(2005)
Proc. IEEE Workshop on Information Assurance and Security
, pp. 92-99
-
-
Livnat, Y.1
Agutter, J.2
Moon, S.3
Erbacher, R.F.4
Foresti, S.5
-
16
-
-
34249909822
-
Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support
-
Jun. 2007
-
Lutters, W. G. and Ackerman, M. S. 2007. Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support. Comput. Supported Coop. Work 16, 3 (Jun. 2007), 341-372.
-
(2007)
Comput. Supported Coop. Work
, vol.16
, Issue.3
, pp. 341-372
-
-
Lutters, W.G.1
Ackerman, M.S.2
-
17
-
-
0035481405
-
Structural Graph Matching Using the EM Algorithm and Singular Value Decomposition
-
Oct. 2001, DOI= http://dx.doi.org/10.1109/34.954602
-
Luo, B. and Hancock, E. R. 2001. Structural Graph Matching Using the EM Algorithm and Singular Value Decomposition. IEEE Trans. Pattern Anal. Mach. Intell. 23, 10 (Oct. 2001), 1120-1136. DOI= http://dx.doi.org/10.1109/34.954602
-
(2001)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.23
, Issue.10
, pp. 1120-1136
-
-
Luo, B.1
Hancock, E.R.2
-
18
-
-
26444436687
-
Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection
-
Recent Advances in Intrusion Detection (RAID2004), Sophia Antipolis, France, 2004. Springer-Verlag
-
Pietraszek, T. 2004 Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. In Recent Advances in Intrusion Detection (RAID2004), volume 3324 of Lecture Notes in Computer Science, 102-124, Sophia Antipolis, France, 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3324
, pp. 102-124
-
-
Pietraszek, T.1
-
19
-
-
33746074836
-
Trust building with explanation interfaces
-
ACM, New York, NY, DOI=http://doi.acm.org/10.1145/1111449.1111475
-
Pu, P. and Chen, L. 2006. Trust building with explanation interfaces. In Proceedings of the 11th international Conference on intelligent User interfaces (Sydney, Australia, January 29 - February 01, 2006). IUI '06. ACM, New York, NY, 93-100. DOI=http://doi.acm.org/10.1145/1111449.1111475
-
(2006)
Proceedings of the 11th International Conference on Intelligent User Interfaces (Sydney, Australia, January 29 - February 01, 2006). IUI '06
, pp. 93-100
-
-
Pu, P.1
Chen, L.2
-
20
-
-
35348897951
-
Command line or pretty lines?: Comparing textual and visual interfaces for intrusion detection
-
ACM, New York, NY, DOI=http://doi.acm.org/10.1145/1240624.1240807
-
Thompson, R. S., Rantanen, E. M., Yurcik, W., and Bailey, B. P. 2007. Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (San Jose, California, USA, April 28 - May 03, 2007). CHI '07. ACM, New York, NY, 1205. DOI=http://doi.acm.org/10.1145/1240624.1240807
-
(2007)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (San Jose, California, USA, April 28 - May 03, 2007). CHI '07
, pp. 1205
-
-
Thompson, R.S.1
Rantanen, E.M.2
Yurcik, W.3
Bailey, B.P.4
-
21
-
-
48349129148
-
A Survey of Explanations in Recommender Systems
-
IEEE Computer Society, Washington, DC, DOI=http://dx.doi.org/10.1109/ ICDEW.2007.4401070
-
Tintarev, N. and Masthoff, J. 2007. A Survey of Explanations in Recommender Systems. In Proceedings of the 2007 IEEE 23rd international Conference on Data Engineering Workshop (April 17 - 20, 2007). ICDEW. IEEE Computer Society, Washington, DC, 801-810. DOI=http://dx.doi.org/10.1109/ICDEW. 2007.4401070
-
(2007)
Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering Workshop (April 17 - 20, 2007). ICDEW
, pp. 801-810
-
-
Tintarev, N.1
Masthoff, J.2
-
22
-
-
72249096877
-
Tagsplanations: Explaining recommendations using tags
-
ACM, New York, NY, DOI=http://doi.acm.org/10.1145/1502650.1502661
-
Vig, J., Sen, S., and Riedl, J. 2009. Tagsplanations: explaining recommendations using tags. In Proceedings of the 13th international Conference on intelligent User interfaces (Sanibel Island, Florida, USA, February 08 - 11, 2009). IUI '09. ACM, New York, NY, 47-56. DOI=http://doi.acm.org/10.1145/ 1502650.1502661
-
(2009)
Proceedings of the 13th International Conference on Intelligent User Interfaces (Sanibel Island, Florida, USA, February 08 - 11, 2009). IUI '09
, pp. 47-56
-
-
Vig, J.1
Sen, S.2
Riedl, J.3
-
23
-
-
85052485831
-
Vigilance and Workload in Automated Systems
-
R. Parasuraman & M. Mouloua (Eds), Mahwah, NJ: Erlbaum
-
Warm, J. S., Dember, W. N., and Hancock, P. A. 1996. Vigilance and Workload in Automated Systems. In R. Parasuraman & M. Mouloua (Eds), Automation and Human Performance: Theory and Applications, 183-200. Mahwah, NJ: Erlbaum.
-
(1996)
Automation and Human Performance: Theory and Applications
, pp. 183-200
-
-
Warm, J.S.1
Dember, W.N.2
Hancock, P.A.3
|