VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
- Publisher
- IEEE Computer Society
- Website
- Year
- 2005
- Period
- 26 October
- Place
- Minneapolis, MN, USA
- ISBN
- 0-7803-9477-1
- Series
- VizSec - IEEE Workshop on Visualization for Computer Security
- DOI
- Volume
- Copyright info
Description
All years
Articles
(2005): Title Page. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.12
(2005): Copyright. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.9
(2005): Preface. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.16
(2005): Committees. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.4
Abdullah, Kulsoom, Lee, Christopher P., Conti, Gregory J., Copeland, John A., Stasko, John T. (2005): IDS RainStorm: Visualizing IDS Alarms. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 1. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.8
Fink, Glenn A., Muessig, Paul, North, Chris (2005): Visual Correlation of Host Processes and Network Traffic. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 2. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.18
Komlodi, Anita, Rheingans, Penny, Ayachit, Utkarsha, Goodall, John R., Joshi, Amit (2005): A User-centered Look at Glyph-based Security Visualization. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 3. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.1
Muelder, Chris, Ma, Kwan-Liu, Bartoletti, Tony (2005): A Visualization Methodology for Characterization of Network Scans. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 4. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.2
Ren, Pin, Gao, Yan, Li, Zhichun, Chen, Yan, Watson, Benjamin (2005): IDGraphs: Intrusion Detection and Analysis Using Histographs. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 5. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.7
Goodall, John R., Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2005): Preserving the Big Picture: Visual Network Traffic Analysis with TN. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 6. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.17
Fink, Glenn A., North, Chris (2005): Root Polar Layout of Internet Address Data for Security Administration. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 7. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.23
Yao, Danfeng, Shin, Michael, Tamassia, Roberto, Winsborough, William H. (2005): Visualization of Automated Trust Negotiation. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 8. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.21
Lakkaraju, Kiran, Bearavolu, Ratna, Slagell, Adam J., Yurcik, William, North, Stephen C. (2005): Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 9. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.3
Conti, Gregory J., Grizzard, Julian B., Ahamad, Mustaque, Owen, Henry L. (2005): Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding . In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 10. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.19
Koike, Hideki, Ohno, Kazuhiro, Koizumi, Kanba (2005): Visualizing Cyber Attacks using IP Matrix. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 11. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.22
Noel, Steven, Jacobs, Michael, Kalapa, Pramod, Jajodia, Sushil (2005): Multiple Coordinated Views for Network Attack Graphs. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 12. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.14
D\'Amico, Anita, Kocka, Michael (2005): Information Assurance Visualizations for Specific Stages of Situational Awareness and Inte. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 13. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.13
Oline, Adam, Reiners, Dirk (2005): Exploring Three-dimensional Visualization for Intrusion Detection. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 14. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.6
Erbacher, Robert F., Christensen, Kim, Sundberg, Amanda (2005): Designing Visualization Capabilities for IDS Challenges. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 15. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.5
Lee, Christopher P., Trost, Jason, Gibbs, Nicholas, Beyah, Raheem A., Copeland, John A. (2005): Visual Firewall: Real-time Network Security Monito. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 16. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.20