-
1
-
-
33749520207
-
Ids rainstorm: Visualizing ids alerts
-
Minneapolis, USA
-
Abdullah, K., Lee, C., Conti, G., Copeland, J.A., Stasko, J.: Ids rainstorm: Visualizing ids alerts. In: Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC). Minneapolis, USA (2005)
-
(2005)
Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC)
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
Stasko, J.5
-
4
-
-
35948950484
-
Caida: Visualizing the internet
-
Claffy, K.: Caida: Visualizing the Internet. IEEE Internet Comput. 5(1), 88 (2001)
-
(2001)
IEEE Internet Comput.
, vol.5
, Issue.1
, pp. 88
-
-
Claffy, K.1
-
5
-
-
0030264246
-
Drawing graphs nicely using simulated annealing
-
DOI
-
Davidson, R., Harel, D.: Drawing graphs nicely using simulated annealing. ACM Trans. Graph. 15(4), 301-331 (1996). DOI http ://doi.acm.org/10.1145/ 234535.234
-
(1996)
ACM Trans. Graph.
, vol.15
, Issue.4
, pp. 301-331
-
-
Davidson, R.1
Harel, D.2
-
6
-
-
0001070640
-
A heuristic for graph drawing
-
Eades, P.A.: A heuristic for graph drawing. In: Congressus Numerantium, vol. 42, pp. 149-160 (1984)
-
(1984)
Congressus Numerantium
, vol.42
, pp. 149-160
-
-
Eades, P.A.1
-
7
-
-
84882893780
-
The Visualization Handbook, chap
-
Elsevier, Amsterdam
-
Eick, S.G.: The Visualization Handbook, chap. Scalable Network Visualization, pp. 819-829. Elsevier, Amsterdam (2005)
-
(2005)
Scalable Network Visualization
, pp. 819-829
-
-
Eick, S.G.1
-
8
-
-
33749537716
-
Visual correlation of host processes and network traffic
-
Fink, G.A., Muessig, P., North, C.: Visual correlation of host processes and network traffic. In: Proceedings of IEEE Workshop on Visualization for Computer Security (VizSEC), pp. 11-19 (2005)
-
(2005)
Proceedings of IEEE Workshop on Visualization for Computer Security (VizSEC
, pp. 11-19
-
-
Fink, G.A.1
Muessig, P.2
North, C.3
-
9
-
-
0026257928
-
Graph drawing by force-directed placement
-
URL citeseer.ist.psu.edu/ fruchterman91graph.html
-
Fruchterman, T.M.J., Reingold, E.M.: Graph drawing by force-directed placement. Software-Practice and Experience 21(11), 1129-1164 (1991). URL citeseer.ist.psu.edu/ fruchterman91graph.html
-
(1991)
Software-Practice and Experience
, vol.21
, Issue.11
, pp. 1129-1164
-
-
Fruchterman, T.M.J.1
Reingold, E.M.2
-
10
-
-
33645236577
-
Focusing on context in network traffic analysis
-
Goodall, J.R., Lutters, W.G., Rheingans, P., Komlodi, A.: Focusing on context in network traffic analysis. IEEE Comput. Graphics Appl. 26(2), 72-80 (2006). DOI http ://doi.ieeecomputersociety.org/10.1109/MCG.2006.31
-
(2006)
IEEE Comput. Graphics Appl.
, vol.26
, Issue.2
, pp. 72-80
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
11
-
-
0024640140
-
An algorithm for drawing general undirected graphs
-
Kamada, T., Kawai, S.: An algorithm for drawing general undirected graphs. Inf. Process. Lett. 31(1), 7-15 (1989). DOI http ://dx.doi.org/10.1016/ 0020-0190(89)90102-6
-
(1989)
Inf. Process. Lett.
, vol.31
, Issue.1
, pp. 7-15
-
-
Kamada, T.1
Kawai, S.2
-
12
-
-
50549087394
-
-
2nd edn Springer, Berlin Heidelberg New York
-
Keim, D., Ward, M.: Visual Data Mining Techniques, pp. 403-427. 2nd edn. Springer, Berlin Heidelberg New York (2002)
-
(2002)
Visual Data Mining Techniques
, pp. 403-427
-
-
Keim, D.1
Ward, M.2
-
13
-
-
33749527089
-
Closing-the-loop in nvisionip: Integrating discovery and search in security visualizations
-
Lakkaraju, K., Bearavolu, R., Slagell, A., Yurcik, W., North, S.: Closing-the-loop in nvisionip: Integrating discovery and search in security visualizations. In: Proceedings of IEEE Workshop on Visualization for Computer Security (VizSEC) (2005)
-
(2005)
Proceedings of IEEE Workshop on Visualization for Computer Security (VizSEC)
-
-
Lakkaraju, K.1
Bearavolu, R.2
Slagell, A.3
Yurcik, W.4
North, S.5
-
14
-
-
4243116400
-
The spinning cube of potential doom
-
Lau, S.: The spinning cube of potential doom. Commun. ACM 47(6), (2004)
-
(2004)
Commun. ACM
, vol.47
, Issue.6
-
-
Lau, S.1
-
15
-
-
33749522392
-
Visual firewall: Real-time network security monito
-
Lee, C.P., Trost, J., Gibbs, N., Beyah, R., Copeland, J.A.: Visual firewall: Real-time network security monito. In: Proceedings of IEEE Workshop on Visualization for Computer Security (VizSEC), pp. 129-136 (2005)
-
(2005)
Proceedings of IEEE Workshop on Visualization for Computer Security (VizSEC
, pp. 129-136
-
-
Lee, C.P.1
Trost, J.2
Gibbs, N.3
Beyah, R.4
Copeland, J.A.5
-
16
-
-
33645243543
-
A visualization paradigm for network intrusion detection
-
Livnat, Y., Agutter, J., Moon, S., Erbacher, R., Foresti, S.: A visualization paradigm for network intrusion detection. In: IEEE Information Asssurance Workshop, pp. 92-99 (2005)
-
(2005)
IEEE Information Asssurance Workshop
, pp. 92-99
-
-
Livnat, Y.1
Agutter, J.2
Moon, S.3
Erbacher, R.4
Foresti, S.5
-
17
-
-
35948957403
-
Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
-
Mansmann, F., Keim, D.A., North, S.C., Rexroad, B., Shelehedal, D.: Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats. IEEE Transactions on Visualization and Computer Graphics 13(6), (2007)
-
(2007)
IEEE Transactions on Visualization and Computer Graphics
, vol.13
, Issue.6
-
-
Mansmann, F.1
Keim, D.A.2
North, S.C.3
Rexroad, B.4
Shelehedal, D.5
-
18
-
-
84883288850
-
Computer intrusion detection and network monitoring-A statistical viewpoint
-
Springer, Berlin Heidelberg New York
-
Marchette, D.J.: Computer intrusion detection and network monitoring-a statistical viewpoint. Statistics for Engineering and Information Science. Springer, Berlin Heidelberg New York (2001)
-
(2001)
Statistics for Engineering and Information Science
-
-
Marchette, D.J.1
-
19
-
-
20444495766
-
Portvis: A tool for portbased detection of security events
-
ACM Press, New York, NY
-
McPherson, J., Ma, K.L., Krystosk, P., Bartoletti, T., Christensen, M.: Portvis: a tool for portbased detection of security events. In: Proceedings of ACM Workshop on Visualization and Data Mining for Computer Security, pp. 73-81. ACM Press, New York, NY (2004)
-
(2004)
Proceedings of ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 73-81
-
-
McPherson, J.1
Ma, K.L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
20
-
-
33749513452
-
A visualization methodology for characterization of network scans
-
Minneapolis, USA
-
Muelder, C., Ma, K.L., Bartoletti, T.: A visualization methodology for characterization of network scans. In: Proceedings of IEEE Workshop on Visualization for Computer Security (VizSEC). Minneapolis, USA (2005)
-
(2005)
Proceedings of IEEE Workshop on Visualization for Computer Security (VizSEC)
-
-
Muelder, C.1
Ma, K.L.2
Bartoletti, T.3
-
21
-
-
84890892760
-
Visualizing the global topology of the mbone
-
Los Alamitos, CA, USA
-
Munzner, T., Hoffman, E., Claffy, K., Fenner, B.: Visualizing the global topology of the mbone. In: IEEE InfoVis. IEEE Computer Society, Los Alamitos, CA, USA (1996)
-
(1996)
IEEE InfoVis. IEEE Computer Society
-
-
Munzner, T.1
Hoffman, E.2
Claffy, K.3
Fenner, B.4
-
22
-
-
33847243488
-
Analysis and visualization of network data using jung
-
O'Madadhain, J., Fisher, D., Smyth, P., White, S., Boey, Y.B.: Analysis and visualization of network data using jung. J. Statist. Software (2007). URL http ://www.jstatsoft.org/
-
(2007)
J. Statist. Software
-
-
O'madadhain, J.1
Fisher, D.2
Smyth, P.3
White, S.4
Boey, Y.B.5
-
23
-
-
84898871788
-
-
PostgreSQL Global Development Group: PostgreSQL
-
PostgreSQL Global Development Group: PostgreSQL (2007). http ://www.postgresql.org/ cited 10/09/2007
-
(2007)
-
-
-
24
-
-
84898899277
-
-
Cited on 11/11/2007
-
Sourcefire: Real-time network awareness (2005). URL http ://www.sourcefire.com/products/rna. html. Cited on 11/11/2007
-
(2005)
Sourcefire: Real-time Network Awareness
-
-
-
25
-
-
33749398393
-
Visual analytics: A grand challenge in science-turning information overload into the opportunity of the decade
-
Keynote address
-
Thomas, J.: Visual analytics: a grand challenge in science-turning information overload into the opportunity of the decade. In: Proceedings IEEE Symposium on Information Visualization (InfoVis), p. xii. IEEE Computer Society (2005). Keynote address
-
(2005)
Proceedings IEEE Symposium on Information Visualization (InfoVis). IEEE Computer Society
-
-
Thomas, J.1
-
27
-
-
39049162063
-
Enhancing visual analysis of network traffic using a knowledge representation
-
Xiao, L., Gerth, J., Hanrahan, P.: Enhancing visual analysis of network traffic using a knowledge representation. In: Visual Analytics Science and Technology (VAST), pp. 107-114 (2006)
-
(2006)
Visual Analytics Science and Technology (VAST
, pp. 107-114
-
-
Xiao, L.1
Gerth, J.2
Hanrahan, P.3
-
28
-
-
13944256121
-
Visflowconnect: Netflow visualizations of link relationships for security situational awareness
-
Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: Visflowconnect: netflow visualizations of link relationships for security situational awareness. In: VizSEC/DMSEC, pp. 26-34 (2004)
-
(2004)
VizSEC/DMSEC
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
|