-
4
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
Jan./Feb.
-
R. Erbacher, K. Walker, and D. Frincke, "Intrusion and Misuse Detection in Large-Scale Systems," IEEE Computer Graphics and Applications, vol. 22, no. 1, pp. 38-48, Jan./Feb. 2002.
-
(2002)
IEEE Computer Graphics and Applications
, vol.22
, Issue.1
, pp. 38-48
-
-
Erbacher, R.1
Walker, K.2
Frincke, D.3
-
6
-
-
84948658749
-
Tudumi: Information visualization system for monitoring and auditing computer logs
-
T. Takada and H. Koike, "Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs," Proc. Sixth Int'l Conf. Information Visualisation, pp. 570-576, 2002.
-
(2002)
Proc. Sixth Int'l Conf. Information Visualisation
, pp. 570-576
-
-
Takada, T.1
Koike, H.2
-
7
-
-
20444484611
-
NVisionIP: NetFlow visualizations of system state for security situational awareness
-
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
-
K. Lakkaraju, W. Yurcik, and A. Lee, "NVisionIP: Netflow Visualizations of System State for Security Situational Awareness," Proc. ACM Workshop Visualization and Data Mining for Computer Security, vol. 29, pp. 65-72, 2004. (Pubitemid 40821174)
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
8
-
-
33749527089
-
Closing-The-Loop in NVisionIP: Integrating discovery and search in security visualizations
-
DOI 10.1109/VIZSEC.2005.1532068, 1532068, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
K. Lakkaraju, R. Bearavolu, A. Slagell, W. Yurcik, and S. North, "Closing-The-Loop in Nvisionip: Integrating Discovery and Search in Security Visualizations," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 75-82, 2005. (Pubitemid 44523250)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 75-82
-
-
Lakkaraju, K.1
Bearavolu, R.2
Slagell, A.3
Yurcik, W.4
North, S.5
-
9
-
-
33749537716
-
Visual correlation of host processes and network traffic
-
DOI 10.1109/VIZSEC.2005.1532061, 1532061, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
G. Fink, P. Muessig, and C. North, "Visual Correlation of Host Processes and Network Traffic," Proc. IEEE Workshop Visualization for Computer Security (VizSEC 05), pp. 11-19, 2005. (Pubitemid 44523243)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 11-19
-
-
Fink, G.A.1
Muessig, P.2
North, C.3
-
10
-
-
85094313960
-
Bridging the host-network divide: Survey, taxonomy, and solution
-
G. Fink, V. Duggirala, R. Correa, and C. North, "Bridging the Host-Network Divide: Survey, Taxonomy, and Solution," Proc. 20th USENIX Conf. Large Installation System Administration, pp. 247-262, 2006.
-
(2006)
Proc. 20th USENIX Conf. Large Installation System Administration
, pp. 247-262
-
-
Fink, G.1
Duggirala, V.2
Correa, R.3
North, C.4
-
12
-
-
35948940663
-
Monitoring network traffic with radial traffic analyzer
-
DOI 10.1109/VAST.2006.261438, 4035756, IEEE Symposium on Visual Analytics Science and Technology 2006, VAST 2006 - Proceedings
-
D. Keim, F. Mansmann, J. Schneidewind, and T. Schreck, "Monitoring Network Traffic with Radial Traffic Analyzer," Proc. IEEE Symp. Visual Analytics Science and Technology, pp. 123-128, 2006. (Pubitemid 351245903)
-
(2006)
IEEE Symposium on Visual Analytics Science and Technology 2006, VAST 2006 - Proceedings
, pp. 123-128
-
-
Keim, D.A.1
Mansmann, F.2
Schneidewind, J.3
Schreck, T.4
-
13
-
-
84862621856
-
Visualization of host behavior for network security
-
F. Mansman, L. Meier, and D.A. Keim, "Visualization of Host Behavior for Network Security," Proc. Workshop Visualization for Computer Security (VizSEC '07), pp. 187-202, 2008.
-
(2008)
Proc. Workshop Visualization for Computer Security (VizSEC '07)
, pp. 187-202
-
-
Mansman, F.1
Meier, L.2
Keim, D.A.3
-
14
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
-
R. Ball, G.A. Fink, and C. North, "Home-Centric Visualization of Network Traffic for Security Administration," Proc. ACM Workshop Visualization and Data Mining for Computer Security, pp. 55-64, 2004. (Pubitemid 40821173)
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
-
15
-
-
13944256121
-
VisFlowCormect: NetFlow visualizations of link relationships for security situational awareness
-
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
-
X. Yin, W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju, "Visflowconnect: Netflow Visualizations of Link Relationships for Security Situational Awareness," Proc. ACM Workshop Visualization and Data Mining for Computer Security, pp. 26-34, 2004. (Pubitemid 40821170)
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
-
16
-
-
33749535268
-
Designing visualization capabilities for IDS challenges
-
DOI 10.1109/VIZSEC.2005.1532074, 1532074, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
R. Erbacher, K. Christensen, and A. Sundberg, "Designing Visualization Capabilities for ids Challenges," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 121-127, 2005. (Pubitemid 44523256)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 121-127
-
-
Erbacher, R.F.1
Christensen, K.2
Sundberg, A.3
-
17
-
-
33749532337
-
Preserving the big picture: Visual network traffic analysis with TNV
-
DOI 10.1109/VIZSEC.2005.1532065, 1532065, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
J. Goodall, W. Lutters, P. Rheingans, and A. Komlodi, "Preserving the Big Picture: Visual Network Traffic Analysis with tnv," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 47-54, 2005. (Pubitemid 44523247)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 47-54
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
18
-
-
33745460819
-
Visualizing network data for intrusion detection
-
DOI 10.1109/IAW.2005.1495940, 1495940, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
K. Abdullah, C. Lee, G. Conti, and J. Copeland, "Visualizing Network Data for Intrusion Detection," Proc. Sixth Ann. IEEE SMC Information Assurance Workshop (IAW '05), pp. 100-108, 2005. (Pubitemid 43948710)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 100-108
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
-
19
-
-
4243116400
-
The spinning cube of potential doom
-
S. Lau, "The Spinning Cube of Potential Doom," Comm. the ACM, vol. 47, no. 6, pp. 25-26, 2004.
-
(2004)
Comm. The ACM
, vol.47
, Issue.6
, pp. 25-26
-
-
Lau, S.1
-
20
-
-
20444495766
-
PortVis: A tool for port-based detection of security events
-
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
-
J. McPherson, K. Ma, P. Krystosk, T. Bartoletti, and M. Christensen, "PortVis: A Tool for Port-Based Detection of Security Events," Proc. the ACM Workshop Visualization and Data Mining for Computer Security, pp. 73-81, 2004. (Pubitemid 40821175)
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 73-81
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
21
-
-
77949348071
-
Netbytes viewer: An entitybased netflow visualization utility for identifying intrusive behavior
-
T. Taylor, S. Brooks, and J. McHugh, "Netbytes Viewer: An Entitybased Netflow Visualization Utility for Identifying Intrusive Behavior," Proc. Workshop Visualization for Computer Security (VizSEC '07), pp. 101-114, 2008.
-
(2008)
Proc. Workshop Visualization for Computer Security (VizSEC '07)
, pp. 101-114
-
-
Taylor, T.1
Brooks, S.2
McHugh, J.3
-
23
-
-
84862625318
-
-
2011. Palo Alto Networks
-
Re-Inventing Network Security. Palo Alto Networks.(2011) http://www.paloaltonetworks.com/literature/whitepapers/Re-inventing-Net work-Security.pdf, 2011.
-
(2011)
Re-Inventing Network Security
-
-
-
24
-
-
84947561772
-
Aggregation and correlation of intrusion-Detection alerts
-
Recent Advances in Intrusion Detection
-
H. Debar and A. Wespi, "Aggregation and Correlation of Intrusion-Detection Alerts," Proc. Fourth Int'l Symp. Recent Advances in Intrusion Detection, pp. 85-103, 2001. (Pubitemid 33352002)
-
(2001)
Lecture Notes in Computer Science
, Issue.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
25
-
-
77956988169
-
M2d2: A formal data model for ids alert correlation
-
B. Morin, L. Mé, H. Debar, and M. Ducassé, "M2D2: A Formal Data Model for IDS Alert Correlation," Proc. Fifth Int'l Symp. Recent Advances in Intrusion Detection (RAID '02), pp. 115-137, 2002.
-
(2002)
Proc. Fifth Int'l Symp. Recent Advances in Intrusion Detection (RAID '02)
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
26
-
-
26444529309
-
False alarm classification model for network-based intrusion detection system
-
M. Shin, E. Kim, and K. Ryu, "False Alarm Classification Model for Network-Based Intrusion Detection System," Proc. Int'l Conf. Intelligent Data Eng. and Automated Learning (IDEAL), pp. 259-265, 2004.
-
(2004)
Proc. Int'l Conf. Intelligent Data Eng. and Automated Learning (IDEAL)
, pp. 259-265
-
-
Shin, M.1
Kim, E.2
Ryu, K.3
-
28
-
-
21944457574
-
Comprehensive approach to intrusion detection alert correlation
-
July-Sept.
-
F. Valeur, G. Vigna, C. Kruegel, and R. Kemmerer, "Comprehensive Approach to Intrusion Detection Alert Correlation," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 3, pp. 146-169, July-Sept. 2004.
-
(2004)
IEEE Trans. Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.4
-
30
-
-
84870897584
-
Network intrusion visualization with niva, an intrusion detection visual analyzer with haptic integration
-
K. Nyarko, T. Capers, C. Scott, and K. Ladeji-Osias, "Network Intrusion Visualization with niva, an Intrusion Detection Visual Analyzer with Haptic Integration," Proc. 10th Symp. Haptic Interfaces for Virtual Environment and Teleoperator Systems (HAPTICS '02), pp. 277 -284, 2002.
-
(2002)
Proc. 10th Symp. Haptic Interfaces for Virtual Environment and Teleoperator Systems (HAPTICS '02)
, pp. 277-284
-
-
Nyarko, K.1
Capers, T.2
Scott, C.3
Ladeji-Osias, K.4
-
32
-
-
33749519234
-
IDGraphs: Intrusion detection and analysis using histographs
-
DOI 10.1109/VIZSEC.2005.1532064, 1532064, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
P. Ren, Y. Gao, Z. Li, Y. Chen, and B. Watson, "Idgraphs: Intrusion Detection and Analysis Using Histographs," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 39-46, 2005. (Pubitemid 44523246)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 39-46
-
-
Ren, P.1
Gao, Y.2
Li, Z.3
Chen, Y.4
Watson, B.5
-
33
-
-
33749537123
-
Visualizing cyber attacks using IP matrix
-
DOI 10.1109/VIZSEC.2005.1532070, 1532070, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
H. Koike, K. Ohno, and K. Koizumi, "Visualizing Cyber Attacks Using ip Matrix," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 91-98, 2005. (Pubitemid 44523252)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 91-98
-
-
Koike, H.1
Ohno, K.2
Koizumi, K.3
-
34
-
-
33749522392
-
Visual firewall: Real-time network security monitor
-
DOI 10.1109/VIZSEC.2005.1532075, 1532075, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
C. Lee, J. Trost, N. Gibbs, R. Beyah, and J. Copeland, "Visual Firewall: Real-Time Network Security Monitor," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 129-136, 2005. (Pubitemid 44523257)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 129-136
-
-
Lee, C.P.1
Trost, J.2
Gibbs, N.3
Beyah, R.4
Copeland, J.A.5
-
35
-
-
33749520207
-
IDS RainStorm: Visualizing IDS alarms
-
DOI 10.1109/VIZSEC.2005.1532060, 1532060, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
K. Abdullah, C. Lee, G. Conti, J. Copeland, and J. Stasko, "Ids Rainstorm: Visualizing ids Alarms," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 1-10, 2005. (Pubitemid 44523242)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 1-10
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
Stasko, J.5
-
36
-
-
33645243543
-
A visualization paradigm for network intrusion detection
-
DOI 10.1109/IAW.2005.1495939, 1495939, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
Y. Livnat, J. Agutter, S. Moon, R. Erbacher, and S. Foresti, "A Visualization Paradigm for Network Intrusion Detection," Proc. Sixth Ann. IEEE SMC Information Assurance Workshop (IAW '05), pp. 92-99, 2005. (Pubitemid 43948709)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 92-99
-
-
Livnat, Y.1
Agutter, J.2
Moon, S.3
Erbacher, R.F.4
Foresti, S.5
-
37
-
-
33749395343
-
Visual correlation for situational awareness
-
DOI 10.1109/INFVIS.2005.1532134, 1532134, IEEE Symposium on Information Visualization, InfoVis 05, Proceedings
-
Y. Livnat, J. Agutter, S. Moon, and S. Foresti, "Visual Correlation for Situational Awareness," Proc. IEEE Symp. Information Visualization (INFOVIS '05), pp. 95-102, 2005. (Pubitemid 44500043)
-
(2005)
Proceedings - IEEE Symposium on Information Visualization, INFO VIS
, pp. 95-102
-
-
Livnat, Y.1
Agutter, J.2
Moon, S.3
Foresti, S.4
-
38
-
-
33645213060
-
Visual correlation of network alerts
-
Mar./Apr.
-
S. Foresti, J. Agutter, Y. Livnat, S. Moon, and R. Erbacher, "Visual Correlation of Network Alerts," IEEE Computer Graphics and Applications, vol. 26, no. 2, pp. 48-59, Mar./Apr. 2006.
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
, pp. 48-59
-
-
Foresti, S.1
Agutter, J.2
Livnat, Y.3
Moon, S.4
Erbacher, R.5
-
39
-
-
33645237139
-
Countering security information overload through alert and packet visualization
-
Mar./Apr.
-
G. Conti, K. Abdullah, J. Grizzard, J. Stasko, J. Copeland, M. Ahamad, H. Owen, and C. Lee, "Countering Security Information Overload through Alert and Packet Visualization," IEEE Computer Graphics and Applications, vol. 26, no. 2, pp. 60-70, Mar./Apr. 2006.
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
, pp. 60-70
-
-
Conti, G.1
Abdullah, K.2
Grizzard, J.3
Stasko, J.4
Copeland, J.5
Ahamad, M.6
Owen, H.7
Lee, C.8
-
40
-
-
33745456201
-
Real-time and forensic network data analysis using animated and coordinated visualization
-
DOI 10.1109/IAW.2005.1495932, 1495932, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
S. Krasser, G. Conti, J. Grizzard, J. Gribschaw, and H. Owen, "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization," Proc. Sixth Ann. IEEE SMC Information Assurance Workshop (IAW '05), pp. 42-49, 2005. (Pubitemid 43948702)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 42-49
-
-
Krasser, S.1
Conti, G.2
Grizzard, J.3
Gribschaw, J.4
Owen, H.5
-
41
-
-
34547276062
-
Visualizing dns traffic
-
P. Ren, J. Kristoff, and B. Gooch, "Visualizing dns Traffic," Proc. Third Int'l Workshop Visualization for Computer Security (VizSEC '06), pp. 23-30, 2006.
-
(2006)
Proc. Third Int'l Workshop Visualization for Computer Security (VizSEC '06)
, pp. 23-30
-
-
Ren, P.1
Kristoff, J.2
Gooch, B.3
-
42
-
-
39049162063
-
Enhancing visual analysis of network traffic using a knowledge representation
-
DOI 10.1109/VAST.2006.261436, 4035754, IEEE Symposium on Visual Analytics Science and Technology 2006, VAST 2006 - Proceedings
-
L. Xiao, J. Gerth, and P. Hanrahan, "Enhancing Visual Analysis of Network Traffic Using a Knowledge Representation," Proc. IEEE Symp. Visual Analytics Science and Technology, pp. 107-114, 2006. (Pubitemid 351245901)
-
(2006)
IEEE Symposium on Visual Analytics Science and Technology 2006, VAST 2006 - Proceedings
, pp. 107-114
-
-
Xiao, L.1
Gerth, J.2
Hanrahan, P.3
-
43
-
-
34248377875
-
SVision: A novel visual network-anomaly identification technique
-
DOI 10.1016/j.cose.2006.10.001, PII S0167404806001507
-
I.-V. Onut and A.A. Ghorbani, "Svision: A Novel Visual Network-Anomaly Identification Technique," Computers Security, vol. 26, no. 3, pp. 201-212, 2007. (Pubitemid 46734414)
-
(2007)
Computers and Security
, vol.26
, Issue.3
, pp. 201-212
-
-
Onut, I.-V.1
Ghorbani, A.A.2
-
44
-
-
35948957403
-
Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
-
DOI 10.1109/TVCG.2007.70522
-
F. Mansmann, D. Keim, S. North, B. Rexroad, and D. Sheleheda, "Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats," IEEE Trans. Visualization and Computer Graphics, vol. 13, no. 6, pp. 1105-1112, Nov./Dec. 2007. (Pubitemid 350076578)
-
(2007)
IEEE Transactions on Visualization and Computer Graphics
, vol.13
, Issue.6
, pp. 1105-1112
-
-
Mansmann, F.1
Keim, D.A.2
North, S.C.3
Rexroad, B.4
Sheleheda, D.5
-
45
-
-
47349099942
-
Spiralview: Towards security policies assessment through visual correlation of network resources with evolution of alarms
-
E. Bertini, P. Hertzog, and D. Lalanne, "Spiralview: Towards Security Policies Assessment through Visual Correlation of Network Resources with Evolution of Alarms," Proc. IEEE Symp. Visual Analytics Science and Technology, pp. 139-146, 2007.
-
(2007)
Proc. IEEE Symp. Visual Analytics Science and Technology
, pp. 139-146
-
-
Bertini, E.1
Hertzog, P.2
Lalanne, D.3
-
46
-
-
56449095222
-
Large-scale network monitoring for visual analysis of attacks
-
F. Fischer, F. Mansmann, D.A. Keim, S. Pietzko, and M. Waldvogel, "Large-Scale Network Monitoring for Visual Analysis of Attacks," Proc. Fifth Int'l Workshop Visualization for Computer Security (VizSec '08), pp. 111-118, 2008.
-
(2008)
Proc. Fifth Int'l Workshop Visualization for Computer Security (VizSec '08)
, pp. 111-118
-
-
Fischer, F.1
Mansmann, F.2
Keim, D.A.3
Pietzko, S.4
Waldvogel, M.5
-
48
-
-
78149458354
-
Visualizing graph dynamics and similarity for enterprise network security and management
-
Q. Liao, A. Striegel, and N. Chawla, "Visualizing Graph Dynamics and Similarity for Enterprise Network Security and Management," Proc. Seventh Int'l Symp. Visualization for Cyber Security (VizSec '10), pp. 34-45, 2010.
-
(2010)
Proc. Seventh Int'l Symp. Visualization for Cyber Security (VizSec '10)
, pp. 34-45
-
-
Liao, Q.1
Striegel, A.2
Chawla, N.3
-
49
-
-
78650922846
-
Ids alert visualization and monitoring through heuristic host selection
-
H. Shiravi, A. Shiravi, and A. Ghorbani, "Ids Alert Visualization and Monitoring through Heuristic Host Selection," Proc. 12th Int'l Conf. Information and Comm. Security, pp. 445-458, 2010.
-
(2010)
Proc. 12th Int'l Conf. Information and Comm. Security
, pp. 445-458
-
-
Shiravi, H.1
Shiravi, A.2
Ghorbani, A.3
-
50
-
-
27744489873
-
Visualizing interdomain routing with BGPlay
-
L. Colitti, G. Di Battista, F. Mariani, M. Patrignani, and M. Pizzonia, "Visualizing Interdomain Routing with BGPlay," J. Graph Algorithms and Applications, vol. 9, pp. 117-148, 2005. (Pubitemid 41597153)
-
(2005)
Journal of Graph Algorithms and Applications
, vol.9
, Issue.1
, pp. 117-148
-
-
Colitti, L.1
Battista, G.D.2
Mariani, F.3
Patrignani, M.4
Pizzonia, M.5
-
52
-
-
33749505987
-
Visualizing internet routing changes
-
DOI 10.1109/TVCG.2006.108, 1703366
-
M. Lad, D. Massey, and L. Zhang, "Visualizing Internet Routing Changes," IEEE Trans. Visualization and Computer Graphics, vol. 12, no. 6, pp. 1450-1460, Nov./Dec. 2006. (Pubitemid 44523089)
-
(2006)
IEEE Transactions on Visualization and Computer Graphics
, vol.12
, Issue.6
, pp. 1450-1460
-
-
Lad, M.1
Massey, D.2
Zhang, L.3
-
53
-
-
0036448607
-
Case study: Interactive visualization for internet security
-
S.T. Teoh, K.-L. Ma, S. Wu, and X. Zhao, "Case Study: Interactive Visualization for Internet Security," Proc. IEEE Visualization (VIS '02), pp. 505-508, 2002. (Pubitemid 35444890)
-
(2002)
Proceedings of the IEEE Visualization Conference
, pp. 505-508
-
-
Teoh, S.T.1
Ma, K.-L.2
Wu, S.F.3
Zhao, X.4
-
54
-
-
13944272563
-
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP
-
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
-
S.T. Teoh, K. Zhang, S.-M. Tseng, K.-L. Ma, and S.F. Wu, "Combining Visual and Automated Data Mining for Near-Real-Time Anomaly Detection and Analysis in bgp," Proc. ACM Workshop Visualization and Data Mining for Computer Security, pp. 35-44, 2004. (Pubitemid 40821171)
-
(2004)
VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 35-44
-
-
Teoh, S.T.1
Zhang, K.2
Tseng, S.-M.3
Ma, K.-L.4
Wu, S.F.5
-
55
-
-
4644354461
-
Detecting flaws and intruders with visual data analysis
-
Sept./Oct.
-
S.T. Teoh, K.-L. Ma, S. Wu, and T. Jankun-Kelly, "Detecting Flaws and Intruders with Visual Data Analysis," IEEE Computer Graphics and Applications, vol. 24, no. 5, pp. 27-35, Sept./Oct. 2004.
-
(2004)
IEEE Computer Graphics and Applications
, vol.24
, Issue.5
, pp. 27-35
-
-
Teoh, S.T.1
Ma, K.-L.2
Wu, S.3
Jankun-Kelly, T.4
-
56
-
-
34547254013
-
BGP eye: A new visualization tool for real-time detection and analysis of BGP anomalies
-
DOI 10.1145/1179576.1179593, 1179593, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
S.T. Teoh, S. Ranjan, A. Nucci, and C.-N. Chuah, "Bgp Eye: A New Visualization Tool for Real-Time Detection and Analysis of bgp Anomalies," Proc. Third Int'l Workshop Visualization for Computer Security (VizSEC '06), pp. 81-90, 2006. (Pubitemid 47131416)
-
(2006)
Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 81-90
-
-
Teoh, S.T.1
Ranjan, S.2
Nucci, A.3
Chuah, C.-N.4
-
57
-
-
0029004440
-
Toward a theory of situation awareness in dynamic systems: Situation awareness
-
M. Endsley, "Toward a Theory of Situation Awareness in Dynamic Systems: Situation Awareness," Human Factors, vol. 37, no. 1, pp. 32-64, 1995.
-
(1995)
Human Factors
, vol.37
, Issue.1
, pp. 32-64
-
-
Endsley, M.1
-
59
-
-
35348856331
-
User issues in visual monitoring environments
-
R.F. Erbacher, "User Issues in Visual Monitoring Environments," Proc. Int'l Conf. Imaging Science, Systems, and Technology, pp. 644-650, 2001.
-
(2001)
Proc. Int'l Conf. Imaging Science, Systems, and Technology
, pp. 644-650
-
-
Erbacher, R.F.1
-
60
-
-
77956684376
-
A multi-phase network situational awareness cognitive task analysis
-
R.F. Erbacher, D.A. Frincke, P.C. Wong, S. Moody, and G. Fink, "A Multi-Phase Network Situational Awareness Cognitive Task Analysis," Information Visualization, vol. 9, pp. 204-219, 2010.
-
(2010)
Information Visualization
, vol.9
, pp. 204-219
-
-
Erbacher, R.F.1
Frincke, D.A.2
Wong, P.C.3
Moody, S.4
Fink, G.5
-
62
-
-
33845604957
-
The perceptual scalability of visualization
-
DOI 10.1109/TVCG.2006.184
-
B. Yost and C. North, "The Perceptual Scalability of Visualization," IEEE Trans. Visualization and Computer Graphics, vol. 12, no. 5, pp. 837-844, Sept./Oct. 2006. (Pubitemid 44955611)
-
(2006)
IEEE Transactions on Visualization and Computer Graphics
, vol.12
, Issue.5
, pp. 837-844
-
-
Yost, B.1
North, C.2
-
64
-
-
33845675644
-
Balancing systematic and flexible exploration of social networks
-
DOI 10.1109/TVCG.2006.122
-
A. Perer and B. Shneiderman, "Balancing Systematic and Flexible Exploration of Social Networks," IEEE Trans. Visualization and Computer Graphics, vol. 12, no. 5, pp. 693-700, Sept./Oct. 2006. (Pubitemid 44955593)
-
(2006)
IEEE Transactions on Visualization and Computer Graphics
, vol.12
, Issue.5
, pp. 693-700
-
-
Perer, A.1
Shneiderman, B.2
-
66
-
-
78651326104
-
Focus-based filtering + clustering technique for power-law networks with small world phenomenon
-
F. Boutin, J. Thièvre, and M. Hascoët, "Focus-Based Filtering + Clustering Technique for Power-Law Networks with Small World Phenomenon," Proc. Conf. Visualization and Data Analysis '06, vol. 6060, no. 1, 2006.
-
(2006)
Proc. Conf. Visualization and Data Analysis '06
, vol.6060
, Issue.1
-
-
Boutin, F.1
Thièvre, J.2
Hascoët, M.3
-
68
-
-
33749533756
-
A user-centered look at glyph-based security visualization
-
DOI 10.1109/VIZSEC.2005.1532062, 1532062, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
A. Komlodi, P. Rheingans, U. Ayachit, J. Goodall, and A. Joshi, "A User-Centered Look at Glyph-Based Security Visualization," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 21-28, 2005. (Pubitemid 44523244)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 21-28
-
-
Komlodi, A.1
Rheingans, P.2
Ayachit, U.3
Goodall, J.R.4
Joshi, A.5
-
69
-
-
33749524265
-
Exploring three-dimensional visualization for intrusion detection
-
DOI 10.1109/VIZSEC.2005.1532073, 1532073, IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
-
A. Oline and D. Reiners, "Exploring Three-dimensional Visualization for Intrusion Detection," Proc. IEEE Workshop Visualization for Computer Security (VizSEC '05), pp. 113-120, 2005. (Pubitemid 44523255)
-
(2005)
IEEE Workshop on Visualization for Computer Security 2005, VizSEC 05, Proceedings
, pp. 113-120
-
-
Ohne, A.1
Reiners, D.2
-
70
-
-
34547282853
-
Vast: Visualizing autonomous system topology
-
J. Oberheide, M. Karir, and D. Blazakis, "Vast: Visualizing Autonomous System Topology," Proc. the Third Int'l Workshop Visualization for Computer Security (VizSEC '06), pp. 71-80, 2006.
-
(2006)
Proc. The Third Int'l Workshop Visualization for Computer Security (VizSEC '06)
, pp. 71-80
-
-
Oberheide, J.1
Karir, M.2
Blazakis, D.3
-
71
-
-
67650479255
-
Netviewer: A visualization tool for network security events
-
Z. Jiawan, Y. Peng, L. Liangfu, and C. Lei, "Netviewer: A Visualization Tool for Network Security Events," Proc. Int'l Conf. Networks Security, Wireless Comm. and Trusted Computing., pp. 434-437, 2009.
-
(2009)
Proc. Int'l Conf. Networks Security, Wireless Comm. and Trusted Computing.
, pp. 434-437
-
-
Jiawan, Z.1
Peng, Y.2
Liangfu, L.3
Lei, C.4
-
72
-
-
0034315717
-
Mapping semantic information in virtual space: Dimensions, variance and individual differences
-
DOI 10.1006/ijhc.2000.0417
-
S.J. Westerman and T. Cribbin, "Mapping Semantic Information in Virtual Space: Dimensions, Variance and Individual Differences," Int'l J. Human-Computer Studies, vol. 53, no. 5, pp. 765-787, 2000. (Pubitemid 32032820)
-
(2000)
International Journal of Human Computer Studies
, vol.53
, Issue.5
, pp. 765-787
-
-
Westerman, S.J.1
Cribbin, T.2
-
76
-
-
0242493653
-
Why not make interfaces better than 3d reality?
-
Nov./Dec.
-
B. Shneiderman, "Why Not Make Interfaces Better than 3D Reality?," IEEE Computer Graphics and Applications, vol. 23, no. 6, pp. 12-15, Nov./Dec. 2003.
-
(2003)
IEEE Computer Graphics and Applications
, vol.23
, Issue.6
, pp. 12-15
-
-
Shneiderman, B.1
-
78
-
-
84862620665
-
On pseudonymization of audit data for intrusion detection
-
Designing Privacy Enhancing Technologies
-
J. Biskup and U. Flegel, "On Pseudonymization of Audit Data for Intrusion Detection," Proc. Int'l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp. 161-180, 2001. (Pubitemid 33241793)
-
(2001)
Lecture Notes in Computer Science
, Issue.2009
, pp. 161-180
-
-
Biskup, J.1
Flegel, U.2
-
79
-
-
84862620662
-
-
Tcpdpriv 2011
-
G. Minshall (2011) Tcpdpriv, http://ita.ee.lbl.gov/html/contrib/tcpdpriv. html 2011.
-
(2011)
-
-
Minshall, G.1
-
81
-
-
1242308060
-
On the design and performance of prefix-preserving ip traffic trace anonymization
-
J. Xu, J. Fan, M. Ammar, and S.B. Moon, "On the Design and Performance of Prefix-Preserving ip Traffic Trace Anonymization," Proc. First ACM SIGCOMM Workshop Internet Measurement, pp. 263-266, 2001.
-
(2001)
Proc. First ACM SIGCOMM Workshop Internet Measurement
, pp. 263-266
-
-
Xu, J.1
Fan, J.2
Ammar, M.3
Moon, S.B.4
-
82
-
-
1242310066
-
A high-level programming environment for packet trace anonymization and transformation
-
R. Pang and V. Paxson, "A High-Level Programming Environment for Packet Trace Anonymization and Transformation," Proc. SIGCOMM '03, pp. 339-351, 2003.
-
(2003)
Proc. SIGCOMM '03
, pp. 339-351
-
-
Pang, R.1
Paxson, V.2
-
84
-
-
0034300797
-
Anomaly-based intrusion detection: Privacy concerns and other problems
-
E. Lundin and E. Jonsson, "Anomaly-Based Intrusion Detection: Privacy Concerns and Other Problems," Computer Networks, vol. 34, pp. 623-640, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 623-640
-
-
Lundin, E.1
Jonsson, E.2
-
85
-
-
0343472295
-
Pseudonymous audit for privacy enhanced intrusion detection
-
M. Sobirey, S. Fischer-Hü bner, and K. Rannenberg, "Pseudonymous Audit for Privacy Enhanced Intrusion Detection," Proc. IFIP TC11 13 Int'l Conf. Information Security in Research and Business, pp. 151-163, 1997.
-
(1997)
Proc. IFIP TC11 13 Int'l Conf. Information Security in Research and Business
, pp. 151-163
-
-
Sobirey, M.1
Fischer-Hübner, S.2
Rannenberg, K.3
-
88
-
-
84862606352
-
-
2011.
-
The PREDICT (2011) website. http://www.predict.org, 2011.
-
(2011)
The PREDICT website
-
-
-
89
-
-
84862620666
-
-
2011.
-
The Skaion (2011) website. http://www.skaion.com, 2011.
-
(2011)
The Skaion website
-
-
-
90
-
-
84862620663
-
-
2011
-
USC/ISI Network Traces (2011) . http://www.isi.edu/ant/index.html, 2011.
-
(2011)
USC/ISI Network Traces
-
-
|