|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 201 occurrences of 111 keywords
|
|
|
Results
Found 254 publication records. Showing 254 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah |
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 81-90, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
visualization, routing, network security, BGP |
1 | George Yee |
Visualization for privacy compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 117-122, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy legislation, visualization, privacy, compliance, e-services |
1 | Dino Schweitzer, Leemon C. Baird III |
Discovering an RC4 anomaly through visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 91-94, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
visualization, cryptography, algorithm analysis |
1 | Jon Oberheide, Manish Karir, Dionysus Blazakis |
VAST: visualizing autonomous system topology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 71-80, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
routing, BGP, security visualization |
1 | Patrick Hertzog |
Visualizations to improve reactivity towards security incidents inside corporate networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 95-102, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
alarm visualization, connection visualization, starfield, security, parallel-coordinates, reactivity, reaction time |
1 | Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici |
An intelligent, interactive tool for exploration and visualization of time-oriented security data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 15-22, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, human-computer interaction, knowledge-based systems, temporal-abstraction, intelligent visualization |
1 | Pin Ren, John Kristoff, Bruce Gooch |
Visualizing DNS traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 23-30, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network security visualization, information visualization, domain name system, visual metaphor |
1 | Kulsoom Abdullah, John A. Copeland |
Tool update: high alarm count issues in IDS rainstorm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 61-62, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IDS alarm visualization, filtering network data, network security information visualization |
1 | Weichao Wang, Aidong Lu |
Visualization assisted detection of sybil attacks in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 51-60, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
interactive detection, topology visualization, visualization on network security, wireless networks, sybil attacks |
1 | William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh (eds.) |
3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006 ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![ACM, 1-59593-549-5 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | William Yurcik |
Tool update: NVisionIP improvements (difference view, sparklines, and shapes). ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 65-66, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IP address space visualization, difference view, sparklines, traffic visualization, security visualization, netflows |
1 | William Yurcik |
Tool update: visflowconnect-IP with advanced filtering from usability testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 63-64, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
traffic visualization, intrusion detection, anomaly detection, parallel coordinates, security visualization |
1 | Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz |
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 1-6, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
attack tracks, visualization, intrusion detection |
1 | Charles V. Wright, Fabian Monrose, Gerald M. Masson |
Using visual motifs to classify encrypted traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006, pp. 41-50, 2006, ACM, 1-59593-549-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network traffic visualization, network security, traffic classification |
1 | Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North |
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 9, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Network Security, Intrusion Detection Systems, Security Visualization |
1 | Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi |
A User-centered Look at Glyph-based Security Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 3, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multivariate display, information visualization, intrusion detection, glyphs |
1 | Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen |
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 10, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
binary object visualization, payload visualization, binary navigation, packet visualization, reverse engineering, network visualization |
1 | Kwan-Liu Ma, Stephen C. North, William Yurcik (eds.) |
2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005 ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![IEEE Computer Society, 0-7803-9477-1 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Kulsoom Abdullah, Christopher P. Lee 0001, Gregory J. Conti, John A. Copeland, John T. Stasko |
IDS RainStorm: Visualizing IDS Alarms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 1, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IDS alarms, alert visualization, log visualization, alarm visualization, network security information visualization, network monitoring |
1 | Anita D'Amico, Michael Kocka |
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 13, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
computer network defense, Security, Visualization, Human Factors, information security, graphics, information assurance, data representation, IA |
1 | |
Copyright. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Glenn A. Fink, Paul Muessig, Chris North 0001 |
Visual Correlation of Host Processes and Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 2, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Information Visualization, Computer Security, System Administration |
1 | Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 |
IDGraphs: Intrusion Detection and Analysis Using Histographs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 5, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Brushing and Linking, Visualization, Intrusion Detection, Interactive System, Dynamic Query, Correlation Matrix |
1 | Chris Muelder, Kwan-Liu Ma, Tony Bartoletti |
A Visualization Methodology for Characterization of Network Scans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 4, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
scalograms, network scans, cyber forensics, adversary characterization, clustering, information visualization, wavelets, graph visualization, security visualization |
1 | Glenn A. Fink, Chris North 0001 |
Root Polar Layout of Internet Address Data for Security Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 7, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
root polar plot, plot density, pixel-oriented visualizations, Internet Protocol, occlusion, overlap |
1 | Steven Noel, Michael Jacobs 0001, Pramod Kalapa, Sushil Jajodia |
Multiple Coordinated Views for Network Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 12, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Network attack modeling, network attack graphs, topological vulnerability analysis, graph filtering, graph visualization, graph clustering |
1 | Hideki Koike, Kazuhiro Ohno, Kanba Koizumi |
Visualizing Cyber Attacks using IP Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 11, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus |
1 | |
Preface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Robert F. Erbacher, Kim Christensen, Amanda Sundberg |
Designing Visualization Capabilities for IDS Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 15, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Visualization, Intrusion Detection, Graphical User Interfaces |
1 | |
Title Page. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Christopher P. Lee 0001, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland |
Visual Firewall: Real-time Network Security Monito. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 16, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
firewall configuration, snort monitoring, user interfaces, information visualization, Network security |
1 | |
Committees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Adam Oline, Dirk Reiners |
Exploring Three-dimensional Visualization for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 14, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
visualization, intrusion detection, data reduction, three-dimensional |
1 | John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi |
Preserving the Big Picture: Visual Network Traffic Analysis with TN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 6, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information visualization, intrusion detection, network analysis, Network visualization |
1 | Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough |
Visualization of Automated Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 8, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
interactive protocol visualization, Automated trust negotiation |
1 | Robert Ball, Glenn A. Fink, Chris North 0001 |
Home-centric visualization of network traffic for security administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 55-64, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, information visualization, networks |
1 | William Yurcik, Xin Meng, Nadir Kiyanclar |
NVisionCC: a visualization framework for high performance cluster security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 133-137, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
NVisionCC, cluster security, high performance security, security situational awareness, security visualization |
1 | InSeon Yoo |
Visualizing windows executable viruses using self-organizing maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 82-89, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
windows executable viruses, visualization, self-organizing maps |
1 | Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju |
VisFlowConnect: netflow visualizations of link relationships for security situational awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 26-34, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
link relationships, parallel axes, security, link analysis, situational awareness, parallel coordinates, security visualization, netflows |
1 | Gregory J. Conti, Kulsoom Abdullah |
Passive visual fingerprinting of network attack tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 45-54, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
application fingerprinting, network attack visualization, operating system fingerprinting, passive fingerprinting, visual fingerprinting, information visualization |
1 | Alfonso Valdes, Martin W. Fong |
Scalable visualization of propagating internet phenomena. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 124-127, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
scalable visualization, data mining, intrusion detection, internet worms |
1 | Kiran Lakkaraju, William Yurcik, Adam J. Lee |
NVisionIP: netflow visualizations of system state for security situational awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 65-72, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security system state, situational awareness, security visualization, NetFlows |
1 | Thomas Goldring |
Scatter (and other) plots for visualizing user profiling data and network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 119-123, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
visualization |
1 | Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo |
Email archive analysis through graphical visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 128-132, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
spam, email, virus |
1 | Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen |
PortVis: a tool for port-based detection of security events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 73-81, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
user interfaces, information visualization, network security |
1 | Gaurav Tandon, Philip K. Chan, Debasis Mitra 0003 |
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 16-25, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, data cleaning, motifs |
1 | Soon Tee Teoh, Ke Zhang 0026, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu |
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 35-44, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
information visualization, network visualization, internet routing |
1 | Jeffrey B. Colombe, Gregory Stephens |
Statistical profiling and visualization for detection of malicious insider attacks on computer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 138-142, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
human-computer interaction, information visualization, anomaly detection, cognitive load |
1 | Hideki Koike, Kazuhiro Ohno |
SnortView: visualization system of snort logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 143-147, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
visualization, intrusion detection |
1 | Stefan Axelsson |
Combining a bayesian classifier with visualisation: understanding the IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 99-108, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
naive bayesian classification, intrusion detection |
1 | Christos Papadopoulos, Chris Kyriakakis, Alexander A. Sawchuk, Xinming He |
CyberSeer: 3D audio-visual immersion for network security and management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 90-98, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
network security, monitoring, network visualization |
1 | Charles V. Wright, Fabian Monrose, Gerald M. Masson |
HMM profiles for network traffic classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 9-15, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
intrusion detection, behavioral modeling, masquerade detection |
1 | Steven Noel, Sushil Jajodia |
Managing attack graph complexity through visual hierarchical aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 109-118, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
network attack graphs, network attack modeling, vulnerability analysis, clustered graphs |
1 | Maja Pusara, Carla E. Brodley |
User re-authentication via mouse movements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 1-8, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
mouse dynamics, user re-authentication, anomaly detection |
Displaying result #201 - #254 of 254 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3] |
|