-
1
-
-
33645236577
-
Focusing on context in network traffic analysis
-
March/April
-
J.R. Goodall, W.G. Lutters, P. Rheingans, and A. Komlodi. Focusing on context in network traffic analysis. IEEE Computer Graphics and Applications, 26(2):72-80, March/April 2006.
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
, pp. 72-80
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
4
-
-
56449095222
-
Large-scale network monitoring for visual analysis of attacks
-
Cambridge, MA, September 15
-
F. Fischer, F. Mansmann, D.A. Keim, S. Pietzko, and M. Waldvogel. Large-scale network monitoring for visual analysis of attacks. In Proc. of 5th International Workshop on Visualization for Computer Security (VizSec'08), pages 111-118, Cambridge, MA, September 15 2008.
-
(2008)
Proc. of 5th International Workshop on Visualization for Computer Security (VizSec'08)
, pp. 111-118
-
-
Fischer, F.1
Mansmann, F.2
Keim, D.A.3
Pietzko, S.4
Waldvogel, M.5
-
5
-
-
84890932071
-
Visual analysis of network flow data with timelines and event plots
-
Sacramento, CA, Octoboer 29
-
D. Phan, J. Gerth, M. Lee, A. Paepcke, and T. Winograd. Visual analysis of network flow data with timelines and event plots. In Proc. of Workshop on Visualization for Computer Security (VizSEC '07), pages 85-99, Sacramento, CA, Octoboer 29 2007.
-
(2007)
Proc. of Workshop on Visualization for Computer Security (VizSEC '07)
, pp. 85-99
-
-
Phan, D.1
Gerth, J.2
Lee, M.3
Paepcke, A.4
Winograd, T.5
-
6
-
-
20444484611
-
NVisionIP: Netflow visualizations of system state for security situational awareness
-
New York, NY
-
K. Lakkaraju, W. Yurcik, and A.J. Lee. NVisionIP: netflow visualizations of system state for security situational awareness. In Proc. of the 2004 ACM workshop on Visualization and data mining for computer security (VizSEC/DMSEC), pages 65-72, New York, NY, 2004.
-
(2004)
Proc. of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
9
-
-
84898878437
-
Visual analysis of corporate network intelligence: Abstracting and reasoning on yesterdays for acting today
-
Sacramento, CA, October 29
-
D. Lalanne, E. Bertini, P. Hertzog, and P. Bados. Visual analysis of corporate network intelligence: Abstracting and reasoning on yesterdays for acting today. In Proc. of Workshop on Visualization for Computer Security (VizSec'07), pages 115-130, Sacramento, CA, October 29 2007.
-
(2007)
Proc. of Workshop on Visualization for Computer Security (VizSec'07)
, pp. 115-130
-
-
Lalanne, D.1
Bertini, E.2
Hertzog, P.3
Bados, P.4
-
10
-
-
85047359787
-
ENAVis: Enterprise network activities visualization
-
San Diego, CA, November 9-14
-
Q. Liao, A. Blaich, A. Striegel, and D. Thain. ENAVis: Enterprise network activities visualization. In Proc. of the USENIX 22nd Large Installation System Administration Conference (LISA '08), pages 59-74, San Diego, CA, November 9-14 2008.
-
(2008)
Proc. of the USENIX 22nd Large Installation System Administration Conference (LISA '08)
, pp. 59-74
-
-
Liao, Q.1
Blaich, A.2
Striegel, A.3
Thain, D.4
-
11
-
-
35048904658
-
Comparison of distance measures for graph-based clustering of documents
-
Graph Based Representations in Pattern Recognition, Springer
-
A. Schenker, M. Last, H. Bunke, and A. Kandel. Comparison of distance measures for graph-based clustering of documents. In Graph Based Representations in Pattern Recognition, Springer LNCS, volume 2726, pages 187-263, 2003.
-
(2003)
LNCS
, vol.2726
, pp. 187-263
-
-
Schenker, A.1
Last, M.2
Bunke, H.3
Kandel, A.4
-
12
-
-
0032024433
-
A graph distance metric based on the maximal common subgraph
-
March
-
H. Bunke and K. Shearer. A graph distance metric based on the maximal common subgraph. Pattern Recognition Letters, 19(3-4):255-259, March 1998.
-
(1998)
Pattern Recognition Letters
, vol.19
, Issue.3-4
, pp. 255-259
-
-
Bunke, H.1
Shearer, K.2
-
13
-
-
34147206967
-
-
A Birkhäuser Boston book
-
H. Bunke, P.J. Dickinson, M. Kraetzl, and W.D. Wallis. A Graph-Theoretic Approach to Enterprise Network Dynamics (Progress in Computer Science and Applied Logic (PCS)), volume 24. A Birkhäuser Boston book, 2007.
-
(2007)
A Graph-Theoretic Approach to Enterprise Network Dynamics (Progress in Computer Science and Applied Logic (PCS))
, vol.24
-
-
Bunke, H.1
Dickinson, P.J.2
Kraetzl, M.3
Wallis, W.D.4
-
15
-
-
34147194284
-
Graph Sequence Visualisation and its Application to Computer Network Monitoring and Abnormal Event Detection
-
chapter Springer Berlin / Heidelberg
-
H. Bunke, P. Dickinson, A. Humm, Ch. Irniger, and M. Kraetzl. Applied Graph Theory in Computer Vision and Pattern Recognition, volume 52, chapter Graph Sequence Visualisation and its Application to Computer Network Monitoring and Abnormal Event Detection, pages 227-245. Springer Berlin / Heidelberg, 2007.
-
(2007)
Applied Graph Theory in Computer Vision and Pattern Recognition
, vol.52
, pp. 227-245
-
-
Bunke, H.1
Dickinson, P.2
Humm, A.3
Irniger, Ch.4
Kraetzl, M.5
-
16
-
-
38849162343
-
Computing communities in large networks using random walks
-
P. Pons and M. Latapy. Computing communities in large networks using random walks. Journal of Graph Algorithms and Applications, 10(2):191-218, 2006.
-
(2006)
Journal of Graph Algorithms and Applications
, vol.10
, Issue.2
, pp. 191-218
-
-
Pons, P.1
Latapy, M.2
-
17
-
-
74049087026
-
Community detection in graphs
-
February
-
S. Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75-174, February 2010.
-
(2010)
Physics Reports
, vol.486
, Issue.3-5
, pp. 75-174
-
-
Fortunato, S.1
-
18
-
-
84950632109
-
Objective criteria for the evaluation of clustering methods
-
Dec.
-
W.M. Rand. Objective criteria for the evaluation of clustering methods. Journal of the American Statistical Association, 66(336):846-850, Dec. 1971.
-
(1971)
Journal of the American Statistical Association
, vol.66
, Issue.336
, pp. 846-850
-
-
Rand, W.M.1
-
19
-
-
48349112329
-
Biclique communities
-
S. Lehmann, M. Schwartz, and L. K. Hansen. Biclique communities. Physical Review E, 78(1):016108, 2008.
-
(2008)
Physical Review E
, vol.78
, Issue.1
, pp. 016108
-
-
Lehmann, S.1
Schwartz, M.2
Hansen, L.K.3
-
20
-
-
14244258507
-
Distributed computing in practice: The condor experience
-
February-April
-
D. Thain, T. Tannenbaum, and M. Livny. Distributed computing in practice: The condor experience. Concurrency and Computation: Practice and Experience, 17(2-4):323-356, February-April 2005.
-
(2005)
Concurrency and Computation: Practice and Experience
, vol.17
, Issue.2-4
, pp. 323-356
-
-
Thain, D.1
Tannenbaum, T.2
Livny, M.3
-
24
-
-
20444495766
-
Portvis: A tool for port-based detection of security events
-
Washington DC
-
J. McPherson, K. Ma, P. Krystosk, T. Bartoletti, and M. Christensen. Portvis: a tool for port-based detection of security events. In Proc. of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSec/DMSEC'04), pages 73-81, Washington DC, 2004.
-
(2004)
Proc. of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSec/DMSEC'04)
, pp. 73-81
-
-
McPherson, J.1
Ma, K.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
26
-
-
33750558182
-
Visualizing network data for intrusion detection
-
United States Military Academy, West Point, NY, June 17-19
-
K. Abdullah, C. Lee, G. Conti, and J.A. Copeland. Visualizing network data for intrusion detection. In Proc. of the 2002 IEEE Workshop on Information Assurance and Security, pages 30-38, United States Military Academy, West Point, NY, June 17-19 2002.
-
(2002)
Proc. of the 2002 IEEE Workshop on Information Assurance and Security
, pp. 30-38
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
-
27
-
-
68749084400
-
Graph-based monitoring of host behavior for network security
-
Sacramento, CA, October 29
-
F. Mansmann, L. Meier, and D. Keim. Graph-based monitoring of host behavior for network security. In Proc. of Workshop on Visualization for Computer Security (VizSec'07), pages 187-202, Sacramento, CA, October 29 2007.
-
(2007)
Proc. of Workshop on Visualization for Computer Security (VizSec'07)
, pp. 187-202
-
-
Mansmann, F.1
Meier, L.2
Keim, D.3
-
29
-
-
33749519234
-
Idgraphs: Intrusion detection and analysis using histographs
-
P. Ren, Y. Gao, Z. Li, Y. Chen, and B. Watson. Idgraphs: Intrusion detection and analysis using histographs. In Proc. of the IEEE Workshops on Visualization for Computer Security (VizSec'05), Minneapolis, MN, October 26 2005.
-
Proc. of the IEEE Workshops on Visualization for Computer Security (VizSec'05), Minneapolis, MN, October 26 2005
-
-
Ren, P.1
Gao, Y.2
Li, Z.3
Chen, Y.4
Watson, B.5
-
30
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
Jan/Feb
-
R.F. Erbacher, K.L. Walker, and D.A. Frincke. Intrusion and misuse detection in large-scale systems. IEEE Computer Graphics and Applications, 22(1):38-47, Jan/Feb 2002.
-
(2002)
IEEE Computer Graphics and Applications
, vol.22
, Issue.1
, pp. 38-47
-
-
Erbacher, R.F.1
Walker, K.L.2
Frincke, D.A.3
-
31
-
-
78149436804
-
Efficient visualization of change events in enterprise networks
-
Baltimore, MD, Aug.28-Sep.1
-
A. Stewart. Efficient visualization of change events in enterprise networks. In Proc. of IEEE Workshop on Enterprise Network Security, pages 1-6, Baltimore, MD, Aug.28-Sep.1 2006.
-
(2006)
Proc. of IEEE Workshop on Enterprise Network Security
, pp. 1-6
-
-
Stewart, A.1
|