


default search action
VizSEC 2010: Ottawa, ON, Canada
- John Gerth:

7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010. ACM 2010, ISBN 978-1-4503-0013-1 - Tamara Yu, Richard Lippmann, James Riordan, Stephen W. Boyer:

EMBER: a global perspective on extreme malicious behavior. 1-12 - Jeffrey Guenther, Fred Volk, Mark Shaneck:

Proposing a multi-touch interface for intrusion detection environments. 13-21 - Matthew Chu, Kyle Ingols, Richard Lippmann, Seth E. Webster, Stephen W. Boyer:

Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR. 22-33 - Qi Liao, Aaron Striegel

, Nitesh V. Chawla
:
Visualizing graph dynamics and similarity for enterprise network security and management. 34-45 - John R. Goodall, Hassan Radwan, Lenny Halseth:

Visual analysis of code security. 46-51 - Cynthia Wagner, Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel:

PeekKernelFlows: peeking into IP flows. 52-57 - Eduard Glatz:

Visualizing host traffic through graphs. 58-63 - Michael Oehler, Dhananjay S. Phatak, F. John Krautheim:

Visualizing your key for secure phone calls and language independence. 64-69 - Wilson Lian, Fabian Monrose, John McHugh:

Traffic classification using visual motifs: an empirical evaluation. 70-78 - Daniel M. Best, Shawn Bohn, Douglas Love, Adam Wynne, William A. Pike:

Real-time visualization of network behaviors for situational awareness. 79-90 - Lane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang, Xintao Wu

:
Interactive detection of network anomalies via coordinated multiple views. 91-101 - Jamie C. Rasmussen, Kate Ehrlich, Steven I. Ross, Susanna E. Kirk, Daniel M. Gruen, John F. Patterson:

Nimble cybersecurity incident management through visualization and defensible recommendations. 102-113

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














