|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 201 occurrences of 111 keywords
|
|
|
Results
Found 254 publication records. Showing 254 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah |
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
visualization, routing, network security, BGP |
1 | George Yee |
Visualization for privacy compliance. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
privacy legislation, visualization, privacy, compliance, e-services |
1 | Dino Schweitzer, Leemon C. Baird III |
Discovering an RC4 anomaly through visualization. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
visualization, cryptography, algorithm analysis |
1 | Jon Oberheide, Manish Karir, Dionysus Blazakis |
VAST: visualizing autonomous system topology. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
routing, BGP, security visualization |
1 | Patrick Hertzog |
Visualizations to improve reactivity towards security incidents inside corporate networks. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
alarm visualization, connection visualization, starfield, security, parallel-coordinates, reactivity, reaction time |
1 | Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici |
An intelligent, interactive tool for exploration and visualization of time-oriented security data. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
security, human-computer interaction, knowledge-based systems, temporal-abstraction, intelligent visualization |
1 | Pin Ren, John Kristoff, Bruce Gooch |
Visualizing DNS traffic. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
network security visualization, information visualization, domain name system, visual metaphor |
1 | Kulsoom Abdullah, John A. Copeland |
Tool update: high alarm count issues in IDS rainstorm. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
IDS alarm visualization, filtering network data, network security information visualization |
1 | Weichao Wang, Aidong Lu |
Visualization assisted detection of sybil attacks in wireless networks. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
interactive detection, topology visualization, visualization on network security, wireless networks, sybil attacks |
1 | William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh (eds.) |
3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006 |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | William Yurcik |
Tool update: NVisionIP improvements (difference view, sparklines, and shapes). |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
IP address space visualization, difference view, sparklines, traffic visualization, security visualization, netflows |
1 | William Yurcik |
Tool update: visflowconnect-IP with advanced filtering from usability testing. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
traffic visualization, intrusion detection, anomaly detection, parallel coordinates, security visualization |
1 | Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz |
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
attack tracks, visualization, intrusion detection |
1 | Charles V. Wright, Fabian Monrose, Gerald M. Masson |
Using visual motifs to classify encrypted traffic. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
network traffic visualization, network security, traffic classification |
1 | Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North |
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
Network Security, Intrusion Detection Systems, Security Visualization |
1 | Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi |
A User-centered Look at Glyph-based Security Visualization. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
multivariate display, information visualization, intrusion detection, glyphs |
1 | Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen |
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
binary object visualization, payload visualization, binary navigation, packet visualization, reverse engineering, network visualization |
1 | Kwan-Liu Ma, Stephen C. North, William Yurcik (eds.) |
2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005 |
VizSEC |
2005 |
DBLP BibTeX RDF |
|
1 | Kulsoom Abdullah, Christopher P. Lee 0001, Gregory J. Conti, John A. Copeland, John T. Stasko |
IDS RainStorm: Visualizing IDS Alarms. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
IDS alarms, alert visualization, log visualization, alarm visualization, network security information visualization, network monitoring |
1 | Anita D'Amico, Michael Kocka |
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
computer network defense, Security, Visualization, Human Factors, information security, graphics, information assurance, data representation, IA |
1 | |
Copyright. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Glenn A. Fink, Paul Muessig, Chris North 0001 |
Visual Correlation of Host Processes and Network Traffic. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
Information Visualization, Computer Security, System Administration |
1 | Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 |
IDGraphs: Intrusion Detection and Analysis Using Histographs. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
Brushing and Linking, Visualization, Intrusion Detection, Interactive System, Dynamic Query, Correlation Matrix |
1 | Chris Muelder, Kwan-Liu Ma, Tony Bartoletti |
A Visualization Methodology for Characterization of Network Scans. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
scalograms, network scans, cyber forensics, adversary characterization, clustering, information visualization, wavelets, graph visualization, security visualization |
1 | Glenn A. Fink, Chris North 0001 |
Root Polar Layout of Internet Address Data for Security Administration. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
root polar plot, plot density, pixel-oriented visualizations, Internet Protocol, occlusion, overlap |
1 | Steven Noel, Michael Jacobs 0001, Pramod Kalapa, Sushil Jajodia |
Multiple Coordinated Views for Network Attack Graphs. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
Network attack modeling, network attack graphs, topological vulnerability analysis, graph filtering, graph visualization, graph clustering |
1 | Hideki Koike, Kazuhiro Ohno, Kanba Koizumi |
Visualizing Cyber Attacks using IP Matrix. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus |
1 | |
Preface. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Robert F. Erbacher, Kim Christensen, Amanda Sundberg |
Designing Visualization Capabilities for IDS Challenges. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
Visualization, Intrusion Detection, Graphical User Interfaces |
1 | |
Title Page. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Christopher P. Lee 0001, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland |
Visual Firewall: Real-time Network Security Monito. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
firewall configuration, snort monitoring, user interfaces, information visualization, Network security |
1 | |
Committees. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Adam Oline, Dirk Reiners |
Exploring Three-dimensional Visualization for Intrusion Detection. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
visualization, intrusion detection, data reduction, three-dimensional |
1 | John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi |
Preserving the Big Picture: Visual Network Traffic Analysis with TN. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
information visualization, intrusion detection, network analysis, Network visualization |
1 | Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough |
Visualization of Automated Trust Negotiation. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
interactive protocol visualization, Automated trust negotiation |
1 | Robert Ball, Glenn A. Fink, Chris North 0001 |
Home-centric visualization of network traffic for security administration. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
security, information visualization, networks |
1 | William Yurcik, Xin Meng, Nadir Kiyanclar |
NVisionCC: a visualization framework for high performance cluster security. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
NVisionCC, cluster security, high performance security, security situational awareness, security visualization |
1 | InSeon Yoo |
Visualizing windows executable viruses using self-organizing maps. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
windows executable viruses, visualization, self-organizing maps |
1 | Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju |
VisFlowConnect: netflow visualizations of link relationships for security situational awareness. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
link relationships, parallel axes, security, link analysis, situational awareness, parallel coordinates, security visualization, netflows |
1 | Gregory J. Conti, Kulsoom Abdullah |
Passive visual fingerprinting of network attack tools. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
application fingerprinting, network attack visualization, operating system fingerprinting, passive fingerprinting, visual fingerprinting, information visualization |
1 | Alfonso Valdes, Martin W. Fong |
Scalable visualization of propagating internet phenomena. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
scalable visualization, data mining, intrusion detection, internet worms |
1 | Kiran Lakkaraju, William Yurcik, Adam J. Lee |
NVisionIP: netflow visualizations of system state for security situational awareness. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
security system state, situational awareness, security visualization, NetFlows |
1 | Thomas Goldring |
Scatter (and other) plots for visualizing user profiling data and network traffic. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
visualization |
1 | Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo |
Email archive analysis through graphical visualization. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
spam, email, virus |
1 | Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen |
PortVis: a tool for port-based detection of security events. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
user interfaces, information visualization, network security |
1 | Gaurav Tandon, Philip K. Chan, Debasis Mitra 0003 |
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
anomaly detection, data cleaning, motifs |
1 | Soon Tee Teoh, Ke Zhang 0026, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu |
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
information visualization, network visualization, internet routing |
1 | Jeffrey B. Colombe, Gregory Stephens |
Statistical profiling and visualization for detection of malicious insider attacks on computer networks. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
human-computer interaction, information visualization, anomaly detection, cognitive load |
1 | Hideki Koike, Kazuhiro Ohno |
SnortView: visualization system of snort logs. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
visualization, intrusion detection |
1 | Stefan Axelsson |
Combining a bayesian classifier with visualisation: understanding the IDS. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
naive bayesian classification, intrusion detection |
1 | Christos Papadopoulos, Chris Kyriakakis, Alexander A. Sawchuk, Xinming He |
CyberSeer: 3D audio-visual immersion for network security and management. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
network security, monitoring, network visualization |
1 | Charles V. Wright, Fabian Monrose, Gerald M. Masson |
HMM profiles for network traffic classification. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
intrusion detection, behavioral modeling, masquerade detection |
1 | Steven Noel, Sushil Jajodia |
Managing attack graph complexity through visual hierarchical aggregation. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
network attack graphs, network attack modeling, vulnerability analysis, clustered graphs |
1 | Maja Pusara, Carla E. Brodley |
User re-authentication via mouse movements. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
mouse dynamics, user re-authentication, anomaly detection |
Displaying result #201 - #254 of 254 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3] |
|