-
1
-
-
84893267350
-
Internet security threat report-2011 trends
-
Symantec Corp, April
-
Symantec Corp. Internet security threat report-2011 trends, White Paper, Symantec Corp, April, 2012.
-
(2012)
White Paper
-
-
Corp, S.1
-
3
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
USENIX Association
-
M. Roesch. Snort-lightweight intrusion detection for networks, Proc. 13th USENIX conference on System administration, USENIX Association 1999, pp.229-238.
-
(1999)
Proc. 13th USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
5
-
-
33645237139
-
Countering security analyst and network administrator overload through alert and packet visualization
-
March doi:10.1109/MCG.2006.30
-
G. Conti, K. Abdullah, J. Grizzard, J. Stasko, J.A. Copeland, M. Ahamad, et al. Countering security analyst and network administrator overload through alert and packet visualization, IEEE Computer Graphics & Applications, vol. 26(2), March 2006, pp. 60-70, doi:10.1109/MCG.2006.30.
-
(2006)
IEEE Computer Graphics & Applications
, vol.26
, Issue.2
, pp. 60-70
-
-
Conti, G.1
Abdullah, K.2
Grizzard, J.3
Stasko, J.4
Copeland, J.A.5
Ahamad, M.6
-
6
-
-
0001907993
-
Theoretical underpinnings of situation awareness: A critical review
-
M. R. Endsley and D. J. Garland Eds. Mahwah, NJ, USA Lawrence Erlbaum Associates Inc
-
M.R. Endsley. Theoretical underpinnings of situation awareness: A critical review, in Situation awareness: Analysis and measurement, M. R. Endsley and D. J. Garland Eds. Mahwah, NJ, USA: Lawrence Erlbaum Associates Inc, 2000, pp.3-28.
-
(2000)
Situation Awareness: Analysis and Measurement
, pp. 3-28
-
-
Endsley, M.R.1
-
7
-
-
0002169477
-
Information visualization
-
S. K. Card, J D. Mackinlay and B. Shneiderman Eds. San Francisco: Morgan Kaufmann
-
S.K. Card, J.D. Mackinlay and B. Shneiderman. Information visualization, in Readings in information visualization: Using vision to think, S. K. Card, J. D. Mackinlay and B. Shneiderman Eds. San Francisco: Morgan Kaufmann, 1999, pp.1-34.
-
(1999)
Readings in Information Visualization: Using Vision to Think
, pp. 1-34
-
-
Card, S.K.1
MacKinlay, J.D.2
Shneiderman, B.3
-
8
-
-
1642518716
-
Visualization methods for timedependent data-an overview
-
ACM Press, 7-10 December doi:10.1109/WSC.2003.1261490
-
W. Muller and H. Schumann. Visualization methods for timedependent data-an overview, Proc. 35th Winter Simulation Conference: Driving Innovation, ACM Press, 7-10 December 2003, pp.737-745, doi:10.1109/WSC.2003.1261490.
-
(2003)
Proc. 35th Winter Simulation Conference: Driving Innovation
, pp. 737-745
-
-
Muller, W.1
Schumann, H.2
-
9
-
-
84876779070
-
An information visualization framework for intrusion detection
-
ACM Press, 24-29 April doi:10.1145/985921.1062935
-
A. Komlodi, J.R. Goodall and W.G. Lutters. An information visualization framework for intrusion detection, Proc. ACM Conference on Human Factors in Computing Systems-extended abstracts, ACM Press, 24-29 April 2004, pp.1743-1746, doi:10.1145/985921.1062935.
-
(2004)
Proc. ACM Conference on Human Factors in Computing Systems-extended Abstracts
, pp. 1743-1746
-
-
Komlodi, A.1
Goodall, J.R.2
Lutters, W.G.3
-
10
-
-
44349090241
-
Network intrusion detection cognitive task analysis: Textual and visual tool usage and recommendations
-
SAGE Publications, 16-20 October doi:10.1177/154193120605000511
-
R.S. Thompson, E.M. Rantanen and W. Yurcik. Network intrusion detection cognitive task analysis: Textual and visual tool usage and recommendations, Proc. Human Factors and Ergonomics Society 50th Annual Meeting, SAGE Publications, 16-20 October 2006, pp.669-673, doi:10.1177/154193120605000511.
-
(2006)
Proc. Human Factors and Ergonomics Society 50th Annual Meeting
, pp. 669-673
-
-
Thompson, R.S.1
Rantanen, E.M.2
Yurcik, W.3
-
11
-
-
33645243543
-
A visualization paradigm for network intrusion detection
-
15-17 June doi:10.1109/IAW.2005.1495939
-
Y. Livnat, J. Agutter, S. Moon, R.F. Erbacher and S. Foresti. A visualization paradigm for network intrusion detection, Proc. 6th IEEE Information Assurance Workshop, 15-17 June 2005, pp.92-99, doi:10.1109/IAW.2005. 1495939.
-
(2005)
Proc. 6th IEEE Information Assurance Workshop
, pp. 92-99
-
-
Livnat, Y.1
Agutter, J.2
Moon, S.3
Erbacher, R.F.4
Foresti, S.5
-
13
-
-
77957957869
-
Tracing genealogical data with timenets
-
ACM Press, 26-28 May 2010 doi:10.1145/1842993.1843035
-
N.W. Kim, S.K. Card and J. Heer. Tracing genealogical data with timenets, Proc. Advanced Visual Interfaces, ACM Press, 26-28 May 2010, pp.241-248, doi:10.1145/1842993.1843035.
-
Proc. Advanced Visual Interfaces
, pp. 241-248
-
-
Kim, N.W.1
Card, S.K.2
Heer, J.3
-
14
-
-
81455141431
-
Eventriver: An event-based visual analytics approach to exploring large text collections with a temporal focus
-
doi:10.1109/TVCG.2010.225
-
D. Luo, J. Yang, M. Krstajic, W. Ribarsky and D. Keim. Eventriver: An event-based visual analytics approach to exploring large text collections with a temporal focus, IEEE Transactions on Visualization and Computer Graphics, vol. 18(1) 2012, pp. 93-105, doi:10.1109/TVCG.2010.225.
-
(2012)
IEEE Transactions on Visualization and Computer Graphics
, vol.18
, Issue.1
, pp. 93-105
-
-
Luo, D.1
Yang, J.2
Krstajic, M.3
Ribarsky, W.4
Keim, D.5
-
15
-
-
84862606327
-
A survey of visualization systems for network security
-
doi:10.1109/TVCG.2011.144
-
H. Shiravi, A. Shiravi and A. Ghorbani. A survey of visualization systems for network security, IEEE Transactions on Visualization and Computer Graphics, vol. 18(8) 2012, pp. 1313-1329, doi:10.1109/TVCG.2011.144.
-
(2012)
IEEE Transactions on Visualization and Computer Graphics
, vol.18
, Issue.8
, pp. 1313-1329
-
-
Shiravi, H.1
Shiravi, A.2
Ghorbani, A.3
-
17
-
-
33749520207
-
Ids rainstorm: Visualizing ids alarms
-
IEEE Computer Society, 26 October doi:10.1109/vizsec.2005.8
-
K. Abdullah, C. Lee, G. Conti, J.A. Copeland and J. Stasko. Ids rainstorm: Visualizing ids alarms, Proc. IEEE Workshop on Visualization for Computer Security, IEEE Computer Society, 26 October 2005, doi:10.1109/vizsec. 2005.8.
-
(2005)
Proc. IEEE Workshop on Visualization for Computer Security
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
Stasko, J.5
-
18
-
-
0033897901
-
Designing pixel-oriented visualization techniques: Theory and applications
-
January-March doi:10.1109/2945.841121
-
D. Keim. Designing pixel-oriented visualization techniques: Theory and applications, IEEE Transactions on Visualization and Computer Graphics, vol. 6(1), January-March 2000, pp. 59-78, doi:10.1109/2945.841121.
-
(2000)
IEEE Transactions on Visualization and Computer Graphics
, vol.6
, Issue.1
, pp. 59-78
-
-
Keim, D.1
-
19
-
-
33749395343
-
Visual correlation for situational awareness
-
IEEE Computer Society Press, 23-25 October doi:10.1109/infvis.2005. 1532134
-
Y. Livnat, J. Agutter, M. Shaun and S. Foresti. Visual correlation for situational awareness, Proc. IEEE Symposium on Information Visualization, IEEE Computer Society Press, 23-25 October 2005, pp.95-102, doi:10.1109/infvis.2005. 1532134.
-
(2005)
Proc. IEEE Symposium on Information Visualization
, pp. 95-102
-
-
Livnat, Y.1
Agutter, J.2
Shaun, M.3
Foresti, S.4
-
20
-
-
47349099942
-
Spiralview: Towards security policies assessment through visual correlation of network resources with evolution of alarms
-
IEEE Computer Society Press, 30 October-1 November doi:10.1109/VAST.2007. 4389007
-
E. Bertini, P. Hertzog and D. Lalanne. Spiralview: Towards security policies assessment through visual correlation of network resources with evolution of alarms, Proc. IEEE Symposium on Visual Analytics Science and Technology, IEEE Computer Society Press, 30 October-1 November 2007, pp.139-146, doi:10.1109/VAST.2007.4389007.
-
(2007)
Proc. IEEE Symposium on Visual Analytics Science and Technology
, pp. 139-146
-
-
Bertini, E.1
Hertzog, P.2
Lalanne, D.3
-
22
-
-
80054821017
-
An evaluation of visual and textual network analysis tools
-
doi:10.1057/ivs.2011.2
-
J.R. Goodall. An evaluation of visual and textual network analysis tools, Information Visualization, vol. 10(2) 2011, pp. 145-157, doi:10.1057/ivs.2011. 2.
-
(2011)
Information Visualization
, vol.10
, Issue.2
, pp. 145-157
-
-
Goodall, J.R.1
-
24
-
-
0029725135
-
The eyes have it: A task by data type taxonomy for information visualizations
-
IEEE Computer Society Press, 3-6 September doi:10.1109/VL.1996.545307
-
B. Shneiderman. The eyes have it: A task by data type taxonomy for information visualizations, Proc. IEEE Visual Languages Symposium, IEEE Computer Society Press, 3-6 September 1996, pp.336-343, doi:10.1109/VL.1996.545307.
-
(1996)
Proc. IEEE Visual Languages Symposium
, pp. 336-343
-
-
Shneiderman, B.1
-
25
-
-
0000972060
-
Different types of 'times' in gis
-
M. J. Egenhofer and R. G. Golledge Eds. New York, NY, USA: Oxford University Press
-
A.U. Frank. Different types of 'times' in gis, in Spatial and temporal reasoning in geographic information systems, M. J. Egenhofer and R. G. Golledge Eds. New York, NY, USA: Oxford University Press, 1998, pp.40-62.
-
(1998)
Spatial and Temporal Reasoning in Geographic Information Systems
, pp. 40-62
-
-
Frank, A.U.1
-
27
-
-
0029462614
-
Sdm: Selective dynamic manipulation of visualizations
-
ACM Press, 14-17 November doi:10.1145/215585.215654
-
M.C. Chuah, S.F. Roth, J. Mattis and J. Kolojejchick. Sdm: Selective dynamic manipulation of visualizations, Proc. 8th Annual ACM Symposium on User Interface and Software Technology, ACM Press, 14-17 November 1995, pp.61-70, doi:10.1145/215585.215654.
-
(1995)
Proc. 8th Annual ACM Symposium on User Interface and Software Technology
, pp. 61-70
-
-
Chuah, M.C.1
Roth, S.F.2
Mattis, J.3
Kolojejchick, J.4
-
28
-
-
33845640864
-
Hierarchical edge bundles: Visualization of adjacency relations in hierarchical data
-
Sept/Oct doi:10.1109/TVCG.2006.147
-
D. Holten. Hierarchical edge bundles: Visualization of adjacency relations in hierarchical data, IEEE Transactions on Visualization and Computer Graphics, vol. 12(5), Sept/Oct 2006, pp. 741-748, doi:10.1109/TVCG.2006.147.
-
(2006)
IEEE Transactions on Visualization and Computer Graphics
, vol.12
, Issue.5
, pp. 741-748
-
-
Holten, D.1
-
29
-
-
40949115266
-
Development of nasa-tlx (task load index): Results of empirical and theoretical research
-
A. Hancock and N. Meshati Eds. Amsterdam, Holland North Holland Press
-
S.G. Hart and L.E. Staveland. Development of nasa-tlx (task load index): Results of empirical and theoretical research, in Human mental workload, A. Hancock and N. Meshati Eds. Amsterdam, Holland: North Holland Press, 1988, pp.139-184.
-
(1988)
Human Mental Workload
, pp. 139-184
-
-
Hart, S.G.1
Staveland, L.E.2
-
30
-
-
44349088702
-
Nasa-task load index (nasa-tlx); 20 years later
-
SAGE Publications, 16-20 October doi:10.1177/154193120605000909
-
S.G. Hart. Nasa-task load index (nasa-tlx); 20 years later, Proc. Human Factors and Ergonomics Society 50th Annual Meeting, SAGE Publications, 16-20 October 2006, pp.904-908, doi:10.1177/154193120605000909.
-
(2006)
Proc. Human Factors and Ergonomics Society 50th Annual Meeting
, pp. 904-908
-
-
Hart, S.G.1
-
31
-
-
80955143426
-
Cloudlines: Compact display of event episodes in multiple time-series
-
Nov Dec doi: 10.1109 TVCG.201 1.179
-
M. Krstajié, E. Bertini and D. Keim. Cloudlines: Compact display of event episodes in multiple time-series, IEEE Transactions on Visualization and Computer Graphics, vol. 17(12), Nov Dec 2011, pp. 2432-2439, doi: 10.1109 TVCG.201 1.179.
-
(2011)
IEEE Transactions on Visualization and Computer Graphics
, vol.17
, Issue.12
, pp. 2432-2439
-
-
Krstajié, M.1
Bertini, E.2
Keim, D.3
|