


default search action
VizSEC 2007: Sacramento, California, USA
- John R. Goodall, Gregory J. Conti, Kwan-Liu Ma:

4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007. Mathematics and Visualization, Springer 2008, ISBN 978-3-540-78242-1 - John R. Goodall:

Introduction to Visualization for Computer Security. 1-17 - Anita D. D'Amico, K. Whitley:

The Real Work of Computer Network Defense Analysts. 19-37 - Jennifer Stoll, Dave McColgin, Michelle Gregory, Vern Crow, W. Keith Edwards:

Adapting Personas for Use in Security Visualization Design. 39-52 - Xiaoyuan Suo, Ying Zhu

, G. Scott Owen:
Measuring the Complexity of Computer Security Visualization Designs. 53-66 - T. H. Yu, Benjamin W. Fuller

, J. H. Bannick, Lee M. Rossey, Robert K. Cunningham:
Integrated Environment Management for Information Operations Testbeds. 67-83 - Doantam Phan, John Gerth, M. Lee, Andreas Paepcke, Terry Winograd:

Visual Analysis of Network Flow Data with Timelines and Event Plots. 85-99 - Teryl Taylor, Stephen Brooks, John McHugh:

NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior. 101-114 - Denis Lalanne

, Enrico Bertini, Patrick Hertzog, P. Bados:
Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today. 115-130 - Jason Pearlman, Penny Rheingans:

Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective. 131-146 - Barry Irwin

, Nick Pilkington:
High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping. 147-158 - Stefano Foresti, James Agutter:

VisAlert: From Idea to Product. 159-174 - Dino Schweitzer, Leemon C. Baird III, William L. Bahn:

Visually Understanding Jam Resistant Communication. 175-186 - Florian Mansmann, L. Meier, Daniel A. Keim:

Visualization of Host Behavior for Network Security. 187-202 - William A. Pike, Chad Scherrer

, S. Zabriskie:
Putting Security in Context: Visual Correlation of Network Activity with Real-World Information. 203-220 - Leevar Williams, Richard Lippmann, Kyle Ingols:

An Interactive Attack Graph Cascade and Reachability Display. 221-236 - Chris Muelder, Lei Chen, Russell Thomason, Kwan-Liu Ma, Tony Bartoletti:

Intelligent Classification and Visualization of Network Scans. 237-253 - Barry Irwin

, Jean-Pierre van Riel:
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope. 255-273

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














