-
1
-
-
0345420217
-
Concepts and meaning
-
K Beals, G Cooke, D Kathman, et al. Chicago, University of Chicago
-
Barsalou L, Yeh W, et al. (1993) Concepts and meaning. Chicago Linguistics Society: Papers from the Parasession on Conceptual Representations.
-
(1993)
Chicago Linguistics Society: Papers from the Parasession on Conceptual Representations
, vol.29
, pp. 23-61
-
-
Barsalou, L.1
Yeh, W.2
-
2
-
-
84890943673
-
-
Chicago, University of Chicago
-
K Beals, G Cooke, D Kathman, et al. Chicago, University of Chicago 29:23-61.
-
, vol.29
, pp. 23-61
-
-
Beals, K.1
Cooke, G.2
Kathman, D.3
-
3
-
-
33645237139
-
Countering security information overload through alert and packet visualization
-
(March/April)
-
Conti G, Abdullah K, et al. (2006) Countering security information overload through alert and packet visualization. IEEE Computer Graphics and Applications (March/April):30-40.
-
(2006)
IEEE Computer Graphics and Applications
, pp. 30-40
-
-
Conti, G.1
Abdullah, K.2
-
4
-
-
27244444920
-
Using behavior knowledge space and temporal information for detecting intrusions in computer networks
-
Cordella LP, Finizio I, et al. (2005) Using behavior knowledge space and temporal information for detecting intrusions in computer networks. Pattern Recognition and Image Analysis, Pt 2, Proceedings 3687:94-102.
-
(2005)
Pattern Recognition and Image Analysis, Pt 2, Proceedings
, vol.3687
, pp. 94-102
-
-
Cordella, L.P.1
Finizio, I.2
-
5
-
-
84964413675
-
Methods of visualizing temporal patterns in and mission impact of computer security breaches
-
IEEE Computer Society
-
D'Amico A and Larkin M (2001) Methods of visualizing temporal patterns in and mission impact of computer security breaches. DARPA Information Survivability Conference and Exposition II, IEEE Computer Society.
-
(2001)
DARPA Information Survivability Conference and Exposition II
-
-
D'amico, A.1
Larkin, M.2
-
6
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
Erbacher R, Walker K, et al. (2002) Intrusion and misuse detection in large-scale systems. Computer Graphics and Applications 22(1):38-48.
-
(2002)
Computer Graphics and Applications
, vol.22
, Issue.1
, pp. 38-48
-
-
Erbacher, R.1
Walker, K.2
-
8
-
-
21644478019
-
I know my network: Collaboration and expertise in intrusion detection
-
CHI Letters, ACM Press, New York
-
Goodall J, Lutters W, et al. (2004) I know my network: Collaboration and expertise in intrusion detection. Proceedings of the ACM Conference on Computer-Supported Cooperative Work, CHI Letters, ACM Press, New York, pp. 342-345.
-
(2004)
Proceedings of the ACM Conference on Computer-Supported Cooperative Work
, pp. 342-345
-
-
Goodall, J.1
Lutters, W.2
-
9
-
-
34547269828
-
Visualizations to improve reactivity towards security incidents inside coroporate networks
-
Alexandria, VA, ACM Press, New York
-
Hertzog P (2006) Visualizations to improve reactivity towards security incidents inside coroporate networks. ACM Conference on Computer and Communications Security, Third International Workshop on Visualization for Computer Security, Alexandria, VA, ACM Press, New York, pp. 95-102.
-
(2006)
ACM Conference on Computer and Communications Security, Third International Workshop on Visualization for Computer Security
, pp. 95-102
-
-
Hertzog, P.1
-
10
-
-
4344584189
-
Visualizing the full spectrum of document relationships
-
Wurzburg, ERGON Verlag
-
Hetzler B, Harris W, et al. (1998) Visualizing the full spectrum of document relationships. International Structures and Relations in Knowledge Organization, Proceedings of the Fifth International ISKO Conference, Wurzburg, ERGON Verlag, pp. 168-175.
-
(1998)
International Structures and Relations in Knowledge Organization, Proceedings of the Fifth International ISKO Conference
, pp. 168-175
-
-
Hetzler, B.1
Harris, W.2
-
12
-
-
0027748352
-
Analysis of an algorithm for distributed recognition and accountability
-
Fairfax, Virginia, United States, ACM Press, New York
-
Ko C, Frincke DA, et al. (1993) Analysis of an algorithm for distributed recognition and accountability. Proceedings of the First ACM Conference on Computer and Communications Security. Fairfax, Virginia, United States, ACM Press, New York.
-
(1993)
Proceedings of the First ACM Conference on Computer and Communications Security
-
-
Ko, C.1
Frincke, D.A.2
-
13
-
-
33745456201
-
Real-time and forensic network data analysis using animated and coordinated visualization
-
West Point, NY
-
Krasser S, Conti G, et al. (2005) Real-time and forensic network data analysis using animated and coordinated visualization. IEEE Workshop of Information Assurance and Security, West Point, NY.
-
(2005)
IEEE Workshop of Information Assurance and Security
-
-
Krasser, S.1
Conti, G.2
-
14
-
-
20444484611
-
NVisionIP: Netflow visualizations of system state for security situational awareness
-
Washington, DC, ACM Press, New York
-
Lakkaraju K, Yurcik W, et al. (2004) NVisionIP: Netflow visualizations of system state for security situational awareness. ACM Conference on Computer and Communications Security, Workshop on Visualization and Data Mining for Computer Security, Washington, DC, ACM Press, New York, pp. 65-72.
-
(2004)
ACM Conference on Computer and Communications Security, Workshop on Visualization and Data Mining for Computer Security
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
-
16
-
-
10744229450
-
Researchers develop network-security visualization tools
-
Paulson L (2004) Researchers develop network-security visualization tools. Computer 37(4): 17-18.
-
(2004)
Computer
, vol.37
, Issue.4
, pp. 17-18
-
-
Paulson, L.1
-
17
-
-
84958955499
-
A mission-impact-based approach to INFOSEC alarm correlation
-
Zurich, Switzerland, Springer, Berlin Heidelberg New York
-
Porras P, Fong M, et al. (2002) A mission-impact-based approach to INFOSEC alarm correlation. Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland, Springer, Berlin Heidelberg New York, pp. 95-114.
-
(2002)
Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 95-114
-
-
Porras, P.1
Fong, M.2
-
19
-
-
35248879179
-
Behavior profiling of email
-
Tucson, AZ, Springer, Berlin Heidelberg New York
-
Stolfo S, Hershkop S, et al. (2003) Behavior profiling of email. First NSF/NIJ Symposium on Intelligence and Security Informatics, Tucson, AZ, Springer, Berlin Heidelberg New York, pp. 74-90.
-
(2003)
First NSF/NIJ Symposium on Intelligence and Security Informatics
, pp. 74-90
-
-
Stolfo, S.1
Hershkop, S.2
-
20
-
-
44349090241
-
Network intrusion detection cognitive task analysis: Textual and visual tool usage and recommendations
-
Thompson R, Rantanen E, et al. (2006) Network intrusion detection cognitive task analysis: Textual and visual tool usage and recommendations. Proceedings of the Human Factors and Ergonomics Society (HFES 06), pp. 669-673.
-
(2006)
Proceedings of the Human Factors and Ergonomics Society (HFES 06
, pp. 669-673
-
-
Thompson, R.1
Rantanen, E.2
|