Search dblp for Publications

export results for "stream:streams/conf/vizsec:"

 download as .bib file

@inproceedings{DBLP:conf/vizsec/CoppaILL23,
  author       = {Emilio Coppa and
                  Alessio Izzillo and
                  Riccardo Lazzeretti and
                  Simone Lenti},
  title        = {FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023,
                  Melbourne, Australia, October 25, 2023},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VizSec60606.2023.00007},
  doi          = {10.1109/VIZSEC60606.2023.00007},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/CoppaILL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/JohnsonGIGCC23,
  author       = {Graham Johnson and
                  Kenny Gruchalla and
                  Michael Ingram and
                  Nalinrat Guba and
                  Robert Cruickshank III and
                  Scott Caruso},
  title        = {Vis-SAGA: Visual Analytics for Situational Awareness of Grid Anomalies},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023,
                  Melbourne, Australia, October 25, 2023},
  pages        = {17--21},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VizSec60606.2023.00009},
  doi          = {10.1109/VIZSEC60606.2023.00009},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/JohnsonGIGCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/JonesT23,
  author       = {Rebecca Jones and
                  Lucas Tate},
  title        = {Visualizing Comparisons of Bill of Materials},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023,
                  Melbourne, Australia, October 25, 2023},
  pages        = {12--16},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VizSec60606.2023.00008},
  doi          = {10.1109/VIZSEC60606.2023.00008},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/JonesT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MillerSP23,
  author       = {Thomas Miller and
                  Miriam Sturdee and
                  Daniel Prince},
  title        = {Exploring the Representation of Cyber-Risk Data Through Sketching},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023,
                  Melbourne, Australia, October 25, 2023},
  pages        = {22--32},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VizSec60606.2023.00010},
  doi          = {10.1109/VIZSEC60606.2023.00010},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/MillerSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ParkerYL23,
  author       = {Sam Parker and
                  Haiyue Yuan and
                  Shujun Li},
  title        = {PassViz: An Interactive Visualisation System for Analysing Leaked
                  Passwords},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023,
                  Melbourne, Australia, October 25, 2023},
  pages        = {33--42},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VizSec60606.2023.00011},
  doi          = {10.1109/VIZSEC60606.2023.00011},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ParkerYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2023,
  title        = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023,
                  Melbourne, Australia, October 25, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VizSec60606.2023},
  doi          = {10.1109/VIZSEC60606.2023},
  isbn         = {979-8-3503-1793-0},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BhattacharjeeIV22,
  author       = {Kaustav Bhattacharjee and
                  Akm Islam and
                  Jaideep Vaidya and
                  Aritra Dasgupta},
  title        = {{PRIVEE:} {A} Visual Analytic Workflow for Proactive Privacy Risk
                  Inspection of Open Data},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022,
                  Oklahoma City, OK, USA, October 19, 2022},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VizSec56996.2022.9941431},
  doi          = {10.1109/VIZSEC56996.2022.9941431},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/BhattacharjeeIV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/CherepanovUJK22,
  author       = {Igor Cherepanov and
                  Alex Ulmer and
                  Jonathan Geraldi Joewono and
                  J{\"{o}}rn Kohlhammer},
  title        = {Visualization Of Class Activation Maps To Explain {AI} Classification
                  Of Network Packet Captures},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022,
                  Oklahoma City, OK, USA, October 19, 2022},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VizSec56996.2022.9941392},
  doi          = {10.1109/VIZSEC56996.2022.9941392},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/CherepanovUJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GuptaPCYSB22,
  author       = {Kuhu Gupta and
                  Aditeya Pandey and
                  Larry Chan and
                  Ambika Yadav and
                  Brian Staats and
                  Michelle A. Borkin},
  title        = {Portola: {A} Hybrid Tree and Network Visualization Technique for Network
                  Segmentation},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022,
                  Oklahoma City, OK, USA, October 19, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VizSec56996.2022.9941388},
  doi          = {10.1109/VIZSEC56996.2022.9941388},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/GuptaPCYSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/KomadinaMG22,
  author       = {Adrian Komadina and
                  Zeljka Mihajlovic and
                  Stjepan Gros},
  title        = {Analysis of the Design Space for Cybersecurity Visualizations in VizSec},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022,
                  Oklahoma City, OK, USA, October 19, 2022},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VizSec56996.2022.9941422},
  doi          = {10.1109/VIZSEC56996.2022.9941422},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/KomadinaMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SchufrinLK22,
  author       = {Marija Schufrin and
                  Hendrik L{\"{u}}cke{-}Tieke and
                  J{\"{o}}rn Kohlhammer},
  title        = {Visual Firewall Log Analysis - At the Border Between Analytical and
                  Appealing},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022,
                  Oklahoma City, OK, USA, October 19, 2022},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VizSec56996.2022.9941462},
  doi          = {10.1109/VIZSEC56996.2022.9941462},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SchufrinLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2022,
  title        = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022,
                  Oklahoma City, OK, USA, October 19, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VizSec56996.2022},
  doi          = {10.1109/VIZSEC56996.2022},
  isbn         = {978-1-6654-6148-1},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniBBLPSP21,
  author       = {Marco Angelini and
                  Graziano Blasilli and
                  Silvia Bonomi and
                  Simone Lenti and
                  Alessia Palleschi and
                  Giuseppe Santucci and
                  Emiliano De Paoli},
  title        = {{BUCEPHALUS:} a BUsiness CEntric cybersecurity Platform for proActive
                  anaLysis Using visual analyticS},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {15--25},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00007},
  doi          = {10.1109/VIZSEC53666.2021.00007},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AngeliniBBLPSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BohmEFP21,
  author       = {Fabian B{\"{o}}hm and
                  Ludwig Englbrecht and
                  Sabrina Friedl and
                  G{\"{u}}nther Pernul},
  title        = {Visual Decision-Support for Live Digital Forensics},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {58--67},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00012},
  doi          = {10.1109/VIZSEC53666.2021.00012},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/BohmEFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/DennigCPK21,
  author       = {Frederik L. Dennig and
                  Eren Cakmak and
                  Henrik Plate and
                  Daniel A. Keim},
  title        = {VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development
                  Organizations to Understand Risk Exposure},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {79--83},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00014},
  doi          = {10.1109/VIZSEC53666.2021.00014},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/DennigCPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Gove21,
  author       = {Robert Gove},
  title        = {Automatic Narrative Summarization for Visualizing Cyber Security Logs
                  and Incident Reports},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00005},
  doi          = {10.1109/VIZSEC53666.2021.00005},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Gove21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GrahamKMHK21,
  author       = {Martin Graham and
                  Robert Kukla and
                  Oleksii Mandrychenko and
                  Darren Hart and
                  Jessie Kennedy},
  title        = {Developing Visualisations to Enhance an Insider Threat Product: {A}
                  Case Study},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {47--57},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00011},
  doi          = {10.1109/VIZSEC53666.2021.00011},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/GrahamKMHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/JohnDLMPP21,
  author       = {Mark F. St. John and
                  Grit Denker and
                  Peeter Laud and
                  Karsten Martiny and
                  Alisa Pankova and
                  Dusko Pavlovic},
  title        = {Decision Support for Sharing Data using Differential Privacy},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {26--35},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00008},
  doi          = {10.1109/VIZSEC53666.2021.00008},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/JohnDLMPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/NadeemVY21,
  author       = {Azqa Nadeem and
                  Sicco Verwer and
                  Shanchieh Jay Yang},
  title        = {{SAGE:} Intrusion Alert-driven Attack Graph Extractor},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {36--41},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00009},
  doi          = {10.1109/VIZSEC53666.2021.00009},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/NadeemVY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ReynoldsMAK21,
  author       = {Steven Lamarr Reynolds and
                  Tobias Mertz and
                  Steven Arzt and
                  J{\"{o}}rn Kohlhammer},
  title        = {User-Centered Design of Visualizations for Software Vulnerability
                  Reports},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {68--78},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00013},
  doi          = {10.1109/VIZSEC53666.2021.00013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/ReynoldsMAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SchreiberSK21,
  author       = {Andreas Schreiber and
                  Tim Sonnekalb and
                  Lynn von Kurnatowski},
  title        = {Towards Visual Analytics Dashboards for Provenance-driven Static Application
                  Security Testing},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {42--46},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00010},
  doi          = {10.1109/VIZSEC53666.2021.00010},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SchreiberSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SopanB21,
  author       = {Awalin Sopan and
                  Konstantin Berlin},
  title        = {{AI} Total: Analyzing Security {ML} Models with Imperfect Data in
                  Production},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {10--14},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00006},
  doi          = {10.1109/VIZSEC53666.2021.00006},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SopanB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2021,
  title        = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021},
  doi          = {10.1109/VIZSEC53666.2021},
  isbn         = {978-1-6654-2085-3},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AlperinWG20,
  author       = {Kenneth B. Alperin and
                  Allan B. Wollaber and
                  Steven R. Gomez},
  editor       = {J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Chris Bryan and
                  Rosa Romero G{\'{o}}mez and
                  Nicolas Prigent},
  title        = {Improving Interpretability for Cyber Vulnerability Assessment Using
                  Focus and Context Visualizations},
  booktitle    = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2020, Virtual Event, USA, October 28, 2020},
  pages        = {30--39},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VizSec51108.2020.00011},
  doi          = {10.1109/VIZSEC51108.2020.00011},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/AlperinWG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BeckerD0E20,
  author       = {Franziska Becker and
                  Arthur Drichel and
                  Christoph M{\"{u}}ller and
                  Thomas Ertl},
  editor       = {J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Chris Bryan and
                  Rosa Romero G{\'{o}}mez and
                  Nicolas Prigent},
  title        = {Interpretable Visualizations of Deep Neural Networks for Domain Generation
                  Algorithm Detection},
  booktitle    = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2020, Virtual Event, USA, October 28, 2020},
  pages        = {25--29},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VizSec51108.2020.00010},
  doi          = {10.1109/VIZSEC51108.2020.00010},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/BeckerD0E20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BeranHKOZ20,
  author       = {Michal Beran and
                  Frantisek Hrdina and
                  Daniel Kouril and
                  Radek Oslejsek and
                  Krist{\'{\i}}na Z{\'{a}}kopcanov{\'{a}}},
  editor       = {J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Chris Bryan and
                  Rosa Romero G{\'{o}}mez and
                  Nicolas Prigent},
  title        = {Exploratory Analysis of File System Metadata for Rapid Investigation
                  of Security Incidents},
  booktitle    = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2020, Virtual Event, USA, October 28, 2020},
  pages        = {11--20},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VizSec51108.2020.00008},
  doi          = {10.1109/VIZSEC51108.2020.00008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/BeranHKOZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ChaffeyS20,
  author       = {Emily J. Chaffey and
                  Daniele Sgandurra},
  editor       = {J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Chris Bryan and
                  Rosa Romero G{\'{o}}mez and
                  Nicolas Prigent},
  title        = {Malware vs Anti-Malware Battle - Gotta Evade 'em All!},
  booktitle    = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2020, Virtual Event, USA, October 28, 2020},
  pages        = {40--44},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VizSec51108.2020.00012},
  doi          = {10.1109/VIZSEC51108.2020.00012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ChaffeyS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/PengSJSWMRFBW20,
  author       = {Chao Peng and
                  David I. Schwartz and
                  Daryl Johnson and
                  Bill Stackpole and
                  Chad Weeden and
                  Jacob Marcovecchio and
                  Drake Richards and
                  Chris Fogle and
                  Christopher Brown and
                  Victoria Walrond},
  editor       = {J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Chris Bryan and
                  Rosa Romero G{\'{o}}mez and
                  Nicolas Prigent},
  title        = {Visualization for Spectators in Cybersecurity Competitions},
  booktitle    = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2020, Virtual Event, USA, October 28, 2020},
  pages        = {21--24},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VizSec51108.2020.00009},
  doi          = {10.1109/VIZSEC51108.2020.00009},
  timestamp    = {Sat, 20 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/PengSJSWMRFBW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SchufrinRKK20,
  author       = {Marija Schufrin and
                  Steven Lamarr Reynolds and
                  Arjan Kuijper and
                  J{\"{o}}rn Kohlhammer},
  editor       = {J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Chris Bryan and
                  Rosa Romero G{\'{o}}mez and
                  Nicolas Prigent},
  title        = {A Visualization Interface to Improve the Transparency of Collected
                  Personal Data on the Internet},
  booktitle    = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2020, Virtual Event, USA, October 28, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VizSec51108.2020.00007},
  doi          = {10.1109/VIZSEC51108.2020.00007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SchufrinRKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2020,
  editor       = {J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Chris Bryan and
                  Rosa Romero G{\'{o}}mez and
                  Nicolas Prigent},
  title        = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2020, Virtual Event, USA, October 28, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VizSec51108.2020},
  doi          = {10.1109/VIZSEC51108.2020},
  isbn         = {978-1-7281-8262-9},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniBBCDDLN19,
  author       = {Marco Angelini and
                  Graziano Blasilli and
                  Luca Borzacchiello and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Camil Demetrescu and
                  Simone Lenti and
                  Simone Nicchi and
                  Giuseppe Santucci},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {SymNav: Visually Assisting Symbolic Execution},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161524},
  doi          = {10.1109/VIZSEC48167.2019.9161524},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AngeliniBBCDDLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/DasguptaK019,
  author       = {Aritra Dasgupta and
                  Robert Kosara and
                  Min Chen},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {Guess Me If You Can: {A} Visual Uncertainty Model for Transparent
                  Evaluation of Disclosure Risks in Privacy-Preserving Data Visualization},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161608},
  doi          = {10.1109/VIZSEC48167.2019.9161608},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/DasguptaK019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FoussRWG19,
  author       = {Brett Fouss and
                  Dennis M. Ross and
                  Allan B. Wollaber and
                  Steven R. Gomez},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {PunyVis: {A} Visual Analytics Approach for Identifying Homograph Phishing
                  Attacks},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161590},
  doi          = {10.1109/VIZSEC48167.2019.9161590},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/FoussRWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GuerraVC19,
  author       = {Jorge L. Guerra and
                  Eduardo E. Veas and
                  Carlos Adri{\'{a}}n Catania},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {A Study on Labeling Network Hostile Behavior with Intelligent Interactive
                  Tools},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161489},
  doi          = {10.1109/VIZSEC48167.2019.9161489},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/GuerraVC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Laughlin0SE19,
  author       = {Brandon Laughlin and
                  Christopher Collins and
                  Karthik Sankaranarayanan and
                  Khalil El{-}Khatib},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {A Visual Analytics Framework for Adversarial Text Generation},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161563},
  doi          = {10.1109/VIZSEC48167.2019.9161563},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/Laughlin0SE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/OShaughnessy19,
  author       = {Stephen O'Shaughnessy},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {Image-based Malware Classification: {A} Space Filling Curve Approach},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161583},
  doi          = {10.1109/VIZSEC48167.2019.9161583},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/OShaughnessy19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/OslejsekRBSV19,
  author       = {Radek Oslejsek and
                  V{\'{\i}}t Rusn{\'{a}}k and
                  Karol{\'{\i}}na Dockalov{\'{a}} Bursk{\'{a}} and
                  Valdemar Sv{\'{a}}bensk{\'{y}} and
                  Jan Vykopal},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {Visual Feedback for Players of Multi-Level Capture the Flag Games:
                  Field Usability Study},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161386},
  doi          = {10.1109/VIZSEC48167.2019.9161386},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/OslejsekRBSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SubramanianPLL19,
  author       = {Siva Sandeep Subramanian and
                  Parab Pushparaj and
                  Zerong Liu and
                  Aidong Lu},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {Explainable Visualization of Collaborative Vandal Behaviors in Wikipedia},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161504},
  doi          = {10.1109/VIZSEC48167.2019.9161504},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SubramanianPLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/UlmerSK19,
  author       = {Alex Ulmer and
                  David Sessler and
                  J{\"{o}}rn Kohlhammer},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {NetCapVis: Web-based Progressive Visual Analytics for Network Packet
                  Captures},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161633},
  doi          = {10.1109/VIZSEC48167.2019.9161633},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/UlmerSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/VargaWT19,
  author       = {Margaret Varga and
                  Carsten Winkelholz and
                  Susan Tr{\"{a}}ber{-}Burdin},
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {An Exploration of Cyber Symbology},
  booktitle    = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VizSec48167.2019.9161577},
  doi          = {10.1109/VIZSEC48167.2019.9161577},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/VargaWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2019,
  editor       = {Robert Gove and
                  Dustin Arendt and
                  J{\"{o}}rn Kohlhammer and
                  Marco Angelini and
                  Celeste Lyn Paul and
                  Chris Bryan and
                  Sean McKenna and
                  Nicolas Prigent and
                  Parnian Najafi and
                  Awalin Sopan},
  title        = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2019, Vancouver, BC, Canada, October 23, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9154509/proceeding},
  isbn         = {978-1-7281-3876-3},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniBBCDFLS18,
  author       = {Marco Angelini and
                  Graziano Blasilli and
                  Pietro Borrello and
                  Emilio Coppa and
                  Daniele Cono D'Elia and
                  Serena Ferracci and
                  Simone Lenti and
                  Giuseppe Santucci},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {ROPMate: Visually Assisting the Creation of ROP-based Exploits},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709204},
  doi          = {10.1109/VIZSEC.2018.8709204},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/AngeliniBBCDFLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ArendtFYBL18,
  author       = {Dustin Lockhart Arendt and
                  Lyndsey R. Franklin and
                  Fumeng Yang and
                  Brooke R. Brisbois and
                  Ryan R. LaMothe},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {Crush Your Data with ViC\({}^{\mbox{2}}\)ES Then {CHISSL} Away},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709212},
  doi          = {10.1109/VIZSEC.2018.8709212},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/ArendtFYBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BakirtzisSFE18,
  author       = {Georgios Bakirtzis and
                  Brandon J. Simon and
                  Cody H. Fleming and
                  Carl R. Elks},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {Looking for a Black Cat in a Dark Room: Security Visualization for
                  Cyber-Physical System Design and Analysis},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709187},
  doi          = {10.1109/VIZSEC.2018.8709187},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/BakirtzisSFE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/CappersMEW18,
  author       = {Bram C. M. Cappers and
                  Paulus N. Meessen and
                  Sandro Etalle and
                  Jarke J. van Wijk},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual
                  Analytics},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709230},
  doi          = {10.1109/VIZSEC.2018.8709230},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/CappersMEW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ChenCAANTTY18,
  author       = {Siming Chen and
                  Shuai Chen and
                  Natalia V. Andrienko and
                  Gennady L. Andrienko and
                  Phong H. Nguyen and
                  Cagatay Turkay and
                  Olivier Thonnard and
                  Xiaoru Yuan},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {User Behavior Map: Visual Exploration for Cyber Security Session Data},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709223},
  doi          = {10.1109/VIZSEC.2018.8709223},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ChenCAANTTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ChouBLM18,
  author       = {Jia{-}Kai Chou and
                  Chris Bryan and
                  Jing Li and
                  Kwan{-}Liu Ma},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {An Empirical Study on Perceptually Masking Privacy in Graph Visualizations},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709181},
  doi          = {10.1109/VIZSEC.2018.8709181},
  timestamp    = {Wed, 15 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/ChouBLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GoveD18,
  author       = {Robert Gove and
                  Lauren Deason},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {Visualizing Automatically Detected Periodic Network Activity},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709177},
  doi          = {10.1109/VIZSEC.2018.8709177},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/GoveD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/KrokosRWV18,
  author       = {Eric Krokos and
                  Alexander Rowden and
                  Kirsten Whitley and
                  Amitabh Varshney},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {Visual Analytics for Root {DNS} Data},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709205},
  doi          = {10.1109/VIZSEC.2018.8709205},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/KrokosRWV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SopanBMK18,
  author       = {Awalin Sopan and
                  Matthew Berninger and
                  Murali Mulakaluri and
                  Raj Katakam},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {Building a Machine Learning Model for the SOC, by the Input from the
                  SOC, and Analyzing it for the {SOC}},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709231},
  doi          = {10.1109/VIZSEC.2018.8709231},
  timestamp    = {Wed, 15 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/SopanBMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/UlmerSSK18,
  author       = {Alex Ulmer and
                  Marija Schufrin and
                  David Sessler and
                  J{\"{o}}rn Kohlhammer},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {Visual-Interactive Identification of Anomalous IP-Block Behavior Using
                  Geo-IP Data},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709182},
  doi          = {10.1109/VIZSEC.2018.8709182},
  timestamp    = {Wed, 15 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/UlmerSSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YangCMBS18,
  author       = {Yifan Yang and
                  John P. Collomosse and
                  Arthi Kanchana Manohar and
                  Jo Briggs and
                  Jamie Steane},
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {{TAPESTRY:} Visualizing Interwoven Identities for Trust Provenance},
  booktitle    = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VIZSEC.2018.8709236},
  doi          = {10.1109/VIZSEC.2018.8709236},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/YangCMBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2018,
  editor       = {Diane Staheli and
                  Celeste Lyn Paul and
                  J{\"{o}}rn Kohlhammer and
                  Daniel M. Best and
                  Stoney Trent and
                  Nicolas Prigent and
                  Robert Gove and
                  Graig Sauer},
  title        = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2018, Berlin, Germany, October 22, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8706256/proceeding},
  isbn         = {978-1-5386-8194-7},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniALSU17,
  author       = {Marco Angelini and
                  Leonardo Aniello and
                  Simone Lenti and
                  Giuseppe Santucci and
                  Daniele Ucci},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {The goods, the bads and the uglies: Supporting decisions in malware
                  detection through visual analytics},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062199},
  doi          = {10.1109/VIZSEC.2017.8062199},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/AngeliniALSU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniLS17,
  author       = {Marco Angelini and
                  Simone Lenti and
                  Giuseppe Santucci},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {{CRUMBS:} {A} cyber security framework browser},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062194},
  doi          = {10.1109/VIZSEC.2017.8062194},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AngeliniLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FranklinPBDF17,
  author       = {Lyndsey Franklin and
                  Meg Pirrung and
                  Leslie M. Blaha and
                  Michelle Dowling and
                  Mi Feng},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {Toward a visualization-supported workflow for cyber alert management
                  using threat models and human-centered design},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062200},
  doi          = {10.1109/VIZSEC.2017.8062200},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/FranklinPBDF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GomezNA17,
  author       = {Rosa Romero G{\'{o}}mez and
                  Yacin Nadji and
                  Manos Antonakakis},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {Towards designing effective visualizations for DNS-based network threat
                  analysis},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062201},
  doi          = {10.1109/VIZSEC.2017.8062201},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/GomezNA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/KimKKK17,
  author       = {Hyungseok Kim and
                  Sukjun Ko and
                  Dong Seong Kim and
                  Huy Kang Kim},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {Firewall ruleset visualization analysis tool based on segmentation},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062196},
  doi          = {10.1109/VIZSEC.2017.8062196},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/KimKKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LeichtnamTPM17,
  author       = {Laetitia Leichtnam and
                  Eric Totel and
                  Nicolas Prigent and
                  Ludovic M{\'{e}}},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {{STARLORD:} Linked security data exploration in a 3D graph},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062203},
  doi          = {10.1109/VIZSEC.2017.8062203},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LeichtnamTPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/NortonQ17,
  author       = {Andrew P. Norton and
                  Yanjun Qi},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {Adversarial-Playground: {A} visualization suite showing how adversarial
                  examples fool deep learning},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062202},
  doi          = {10.1109/VIZSEC.2017.8062202},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/NortonQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SanthanamHKM17,
  author       = {Ganesh Ram Santhanam and
                  Benjamin Holland and
                  Suresh C. Kothari and
                  Jon Mathews},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {Interactive visualization toolbox to detect sophisticated android
                  malware},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062197},
  doi          = {10.1109/VIZSEC.2017.8062197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SanthanamHKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SethiW17,
  author       = {Aneesha Sethi and
                  Gary B. Wills},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {Expert-interviews led analysis of EEVi - {A} model for effective visualization
                  in cyber-security},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062195},
  doi          = {10.1109/VIZSEC.2017.8062195},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SethiW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/TheronMCF17,
  author       = {Roberto Ther{\'{o}}n and
                  Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and
                  Jos{\'{e}} Camacho and
                  Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez},
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {Network-wide intrusion detection supported by multivariate analysis
                  and interactive visualization},
  booktitle    = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/VIZSEC.2017.8062198},
  doi          = {10.1109/VIZSEC.2017.8062198},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/TheronMCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2017,
  editor       = {Sophie Engle and
                  Diane Staheli and
                  Celeste Lyn Paul and
                  Simon Walton and
                  Nicolas Prigent and
                  Robert Gove and
                  Lane Harrison},
  title        = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2017, Phoenix, AZ, USA, October 2, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8052583/proceeding},
  isbn         = {978-1-5386-2693-1},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AlamGJ16,
  author       = {Md. Jawaherul Alam and
                  Michael T. Goodrich and
                  Timothy Johnson},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {J-Viz: Finding algorithmic complexity attacks via graph visualization
                  of Java bytecode},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739575},
  doi          = {10.1109/VIZSEC.2016.7739575},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AlamGJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AnhNUK16,
  author       = {Huynh Ngoc Anh and
                  Wee Keong Ng and
                  Alex Ulmer and
                  J{\"{o}}rn Kohlhammer},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Uncovering periodic network signals of cyber attacks},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739581},
  doi          = {10.1109/VIZSEC.2016.7739581},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AnhNUK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ArendtBBP16,
  author       = {Dustin Arendt and
                  Daniel M. Best and
                  Russ Burtner and
                  Celeste Lyn Paul},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {CyberPetri at {CDX} 2016: Real-time network situation awareness},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739584},
  doi          = {10.1109/VIZSEC.2016.7739584},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ArendtBBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AssalCB16,
  author       = {Hala Assal and
                  Sonia Chiasson and
                  Robert Biddle},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Cesar: Visual representation of source code vulnerabilities},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739576},
  doi          = {10.1109/VIZSEC.2016.7739576},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AssalCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AupetitZVDB16,
  author       = {Micha{\"{e}}l Aupetit and
                  Yury Zhauniarovich and
                  Giorgos Vasiliadis and
                  Marc Dacier and
                  Yazan Boshmaf},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Visualization of actionable knowledge to mitigate DRDoS attacks},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739577},
  doi          = {10.1109/VIZSEC.2016.7739577},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AupetitZVDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BuchananDK16,
  author       = {Laurin Buchanan and
                  Anita D'Amico and
                  Drew Kirkpatrick},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Mixed method approach to identify analytic questions to be visualized
                  for military cyber incident handlers},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739578},
  doi          = {10.1109/VIZSEC.2016.7739578},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/BuchananDK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/CappersW16,
  author       = {Bram C. M. Cappers and
                  Jarke J. van Wijk},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Understanding the context of network traffic alerts},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739579},
  doi          = {10.1109/VIZSEC.2016.7739579},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/CappersW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Gove16,
  author       = {Robert Gove},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {{V3SPA:} {A} visual analysis, exploration, and diffing tool for SELinux
                  and SEAndroid security policies},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739580},
  doi          = {10.1109/VIZSEC.2016.7739580},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Gove16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/PerytMCVMC16,
  author       = {Sebastian Peryt and
                  Jose Andre Morales and
                  William Casey and
                  Aaron Volkmann and
                  Bud Mishra and
                  Yang Cai},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Visualizing a Malware Distribution Network},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739585},
  doi          = {10.1109/VIZSEC.2016.7739585},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/PerytMCVMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/PostWBHMH16,
  author       = {Tobias Post and
                  Thomas Wischgoll and
                  Adam R. Bryant and
                  Bernd Hamann and
                  Paul M{\"{u}}ller and
                  Hans Hagen},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Visually guided flow tracking in software-defined networking},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739586},
  doi          = {10.1109/VIZSEC.2016.7739586},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/PostWBHMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SiadatiSM16,
  author       = {Hossein Siadati and
                  Bahador Saket and
                  Nasir D. Memon},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Detecting malicious logins in enterprise networks using visualization},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739582},
  doi          = {10.1109/VIZSEC.2016.7739582},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SiadatiSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SyamkumarDB16,
  author       = {Meenakshi Syamkumar and
                  Ramakrishnan Durairajan and
                  Paul Barford},
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {Bigfoot: {A} geo-based visualization methodology for detecting {BGP}
                  threats},
  booktitle    = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/VIZSEC.2016.7739583},
  doi          = {10.1109/VIZSEC.2016.7739583},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SyamkumarDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2016,
  editor       = {Daniel M. Best and
                  Diane Staheli and
                  Nicolas Prigent and
                  Sophie Engle and
                  Lane Harrison},
  title        = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2016, Baltimore, MD, USA, October 24, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7701173/proceeding},
  isbn         = {978-1-5090-1605-1},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AngeliniPS15,
  author       = {Marco Angelini and
                  Nicolas Prigent and
                  Giuseppe Santucci},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {{PERCIVAL:} proactive and reactive attack and response assessment
                  for cyber incidents using visual analytics},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312764},
  doi          = {10.1109/VIZSEC.2015.7312764},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AngeliniPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ArendtBBBGPP15,
  author       = {Dustin Lockhart Arendt and
                  Russ Burtner and
                  Daniel M. Best and
                  Nathan D. Bos and
                  John R. Gersh and
                  Christine D. Piatko and
                  Celeste Lyn Paul},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {Ocelot: user-centered design of a decision support visualization for
                  network quarantine},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312763},
  doi          = {10.1109/VIZSEC.2015.7312763},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ArendtBBBGPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BattistaDPPRT15,
  author       = {Giuseppe Di Battista and
                  Valentino Di Donato and
                  Maurizio Patrignani and
                  Maurizio Pizzonia and
                  Vincenzo Roselli and
                  Roberto Tamassia},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {Bitconeview: visualization of flows in the bitcoin transaction graph},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312773},
  doi          = {10.1109/VIZSEC.2015.7312773},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/BattistaDPPRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/CappersW15,
  author       = {Bram C. M. Cappers and
                  Jarke J. van Wijk},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {{SNAPS:} Semantic network traffic analysis through projection and
                  selection},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312768},
  doi          = {10.1109/VIZSEC.2015.7312768},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/CappersW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GrayRR15,
  author       = {Cameron C. Gray and
                  Panagiotis D. Ritsos and
                  Jonathan C. Roberts},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {Contextual network navigation to provide situational awareness for
                  network administrators},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312769},
  doi          = {10.1109/VIZSEC.2015.7312769},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/GrayRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HaoHH15,
  author       = {Lihua Hao and
                  Christopher G. Healey and
                  Steve E. Hutchinson},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {Ensemble visualization for cyber situation awareness of network security
                  data},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312766},
  doi          = {10.1109/VIZSEC.2015.7312766},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/HaoHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Legg15,
  author       = {Philip A. Legg},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {Visualizing the insider threat: challenges and tools for identifying
                  malicious user activity},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312772},
  doi          = {10.1109/VIZSEC.2015.7312772},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/Legg15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/McKennaSM15,
  author       = {Sean McKenna and
                  Diane Staheli and
                  Miriah D. Meyer},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {Unlocking user-centered design methods for building cyber security
                  visualizations},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312771},
  doi          = {10.1109/VIZSEC.2015.7312771},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/McKennaSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WaltonMC15,
  author       = {Simon J. Walton and
                  Eamonn Maguire and
                  Min Chen},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {A visual analytics loop for supporting model development},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312767},
  doi          = {10.1109/VIZSEC.2015.7312767},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/WaltonMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WebgaL15,
  author       = {Kodzo Wegba and
                  Aidong Lu},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {Discovery of rating fraud with real-time streaming visual analytics},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312770},
  doi          = {10.1109/VIZSEC.2015.7312770},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/WebgaL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YuenTH15,
  author       = {Joseph Yuen and
                  Benjamin P. Turnbull and
                  Justin Hernandez},
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {Visual analytics for cyber red teaming},
  booktitle    = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/VIZSEC.2015.7312765},
  doi          = {10.1109/VIZSEC.2015.7312765},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/YuenTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2015,
  editor       = {Lane Harrison and
                  Nicolas Prigent and
                  Sophie Engle and
                  Daniel M. Best},
  title        = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec
                  2015, Chicago, IL, USA, October 25, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7310645/proceeding},
  isbn         = {978-1-4673-7599-3},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BestEK14,
  author       = {Daniel M. Best and
                  Alex Endert and
                  Daniel Kidwell},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {7 key challenges for visualization in cyber network defense},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671497},
  doi          = {10.1145/2671491.2671497},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/BestEK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ChenGYMSE14,
  author       = {Siming Chen and
                  Cong Guo and
                  Xiaoru Yuan and
                  Fabian Merkle and
                  Hanna Sch{\"{a}}fer and
                  Thomas Ertl},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {{OCEANS:} online collaborative explorative analysis on network security},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671493},
  doi          = {10.1145/2671491.2671493},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ChenGYMSE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FischerK14,
  author       = {Fabian Fischer and
                  Daniel A. Keim},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {NStreamAware: real-time visual analytics for data streams to enhance
                  situational awareness},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {65--72},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671495},
  doi          = {10.1145/2671491.2671495},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/FischerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FowlerJSSAKL14,
  author       = {J. Joseph Fowler and
                  Thienne M. Johnson and
                  Paolo Simonetto and
                  Michael Schneider and
                  Carlos Acedo and
                  Stephen G. Kobourov and
                  Loukas Lazos},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {IMap: visualizing network activity over internet maps},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {80--87},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671501},
  doi          = {10.1145/2671491.2671501},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/FowlerJSSAKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GoveSGLB14,
  author       = {Robert Gove and
                  Joshua Saxe and
                  Sigfried Gold and
                  Alexander Long and
                  Giacomo Bergamo},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {{SEEM:} a scalable visualization for comparing multiple large sets
                  of attributes for malware analysis},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {72--79},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671496},
  doi          = {10.1145/2671491.2671496},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/GoveSGLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HumphriesPBM14,
  author       = {Christopher Humphries and
                  Nicolas Prigent and
                  Christophe Bidan and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {{CORGI:} combination, organization and reconstruction through graphical
                  interactions},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {57--64},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671494},
  doi          = {10.1145/2671491.2671494},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/HumphriesPBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LongSG14,
  author       = {Alexander Long and
                  Joshua Saxe and
                  Robert Gove},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {Detecting malware samples with similar image sets},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {88--95},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671500},
  doi          = {10.1145/2671491.2671500},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/LongSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/StaheliYCDNOMH14,
  author       = {Diane Staheli and
                  Tamara Yu and
                  R. Jordan Crouser and
                  Suresh Damodaran and
                  Kevin Nam and
                  B. David O'Gwynn and
                  Sean McKenna and
                  Lane Harrison},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {Visualization evaluation for cyber security: trends and future directions},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {49--56},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671492},
  doi          = {10.1145/2671491.2671492},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/StaheliYCDNOMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/StangeDLW14,
  author       = {Jan{-}Erik Stange and
                  Marian D{\"{o}}rk and
                  Johannes Landstorfer and
                  Reto Wettach},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {Visual filter: graphical exploration of network security log files},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {41--48},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671503},
  doi          = {10.1145/2671491.2671503},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/StangeDLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WagnerARDKLT14,
  author       = {Markus Wagner and
                  Wolfgang Aigner and
                  Alexander Rind and
                  Hermann Dornhackl and
                  Konstantin Kadletz and
                  Robert Luh and
                  Paul Tavolato},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {Problem characterization and abstraction for visual analytics in behavior-based
                  malware pattern analysis},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {9--16},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671498},
  doi          = {10.1145/2671491.2671498},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/WagnerARDKLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WaltonMC14,
  author       = {Simon J. Walton and
                  Eamonn Maguire and
                  Min Chen},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {Multiple queries with conditional attributes (QCATs) for anomaly detection
                  and visualization},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {17--24},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671502},
  doi          = {10.1145/2671491.2671502},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/WaltonMC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WuchnerPO14,
  author       = {Tobias W{\"{u}}chner and
                  Alexander Pretschner and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {{DAVAST:} data-centric system level activity visualization},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671499},
  doi          = {10.1145/2671491.2671499},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/WuchnerPO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2014,
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491},
  doi          = {10.1145/2671491},
  isbn         = {978-1-4503-2826-5},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/0002TT13,
  author       = {Stavros Papadopoulos and
                  Georgios Theodoridis and
                  Dimitrios Tzovaras},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {BGPfuse: using visual feature fusion for the detection and attribution
                  of {BGP} anomalies},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {57--64},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517965},
  doi          = {10.1145/2517957.2517965},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/0002TT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AlsalehAAA13,
  author       = {Mansour Alsaleh and
                  Abdullah Alqahtani and
                  Abdulrahman Alarifi and
                  AbdulMalik S. Al{-}Salman},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {Visualizing {PHPIDS} log files for better understanding of web server
                  attacks},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517958},
  doi          = {10.1145/2517957.2517958},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AlsalehAAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HaoHH13,
  author       = {Lihua Hao and
                  Christopher G. Healey and
                  Steve E. Hutchinson},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {Flexible web visualization for alert-based network security analytics},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517962},
  doi          = {10.1145/2517957.2517962},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/HaoHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HumphriesPBM13,
  author       = {Christopher Humphries and
                  Nicolas Prigent and
                  Christophe Bidan and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {{ELVIS:} Extensible Log VISualization},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {9--16},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517959},
  doi          = {10.1145/2517957.2517959},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/HumphriesPBM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/KarapistoliSE13,
  author       = {Eirini D. Karapistoli and
                  Panagiotis G. Sarigiannidis and
                  Anastasios A. Economides},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {{SRNET:} a real-time, cross-based anomaly detection and visualization
                  system for wireless sensor networks},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {49--56},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517964},
  doi          = {10.1145/2517957.2517964},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/KarapistoliSE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LeschkeN13,
  author       = {Timothy R. Leschke and
                  Charles K. Nicholas},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {Change-link 2.0: a digital forensic tool for visualizing changes to
                  shadow volume data},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {17--24},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517960},
  doi          = {10.1145/2517957.2517960},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LeschkeN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MatuszakDS13,
  author       = {William J. Matuszak and
                  Lisa Cingiser DiPippo and
                  Yan Lindsay Sun},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {CyberSAVe: situational awareness visualization for cyber security
                  of smart grid systems},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517961},
  doi          = {10.1145/2517957.2517961},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/MatuszakDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/NunnallyAUCB13,
  author       = {Troy J. Nunnally and
                  Kulsoom Abdullah and
                  A. Selcuk Uluagac and
                  John A. Copeland and
                  Raheem A. Beyah},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {\emph{NAVSEC}: a recommender system for 3D network security visualizations},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {41--48},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517963},
  doi          = {10.1145/2517957.2517963},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/NunnallyAUCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/StoffelFK13,
  author       = {Florian Stoffel and
                  Fabian Fischer and
                  Daniel A. Keim},
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {Finding anomalies in time-series using visual correlation for interactive
                  root cause analysis},
  booktitle    = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  pages        = {65--72},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957.2517966},
  doi          = {10.1145/2517957.2517966},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/StoffelFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2013,
  editor       = {John R. Goodall and
                  Kwan{-}Liu Ma and
                  Sophie Engle and
                  Fabian Fischer},
  title        = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta,
                  GA, USA, October 14, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517957},
  doi          = {10.1145/2517957},
  isbn         = {978-1-4503-2173-0},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/EngleW12,
  author       = {Sophie Engle and
                  Sean Whalen},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {Visualizing distributed memory computations with hive plots},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {56--63},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379698},
  doi          = {10.1145/2379690.2379698},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/EngleW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Erbacher12,
  author       = {Robert F. Erbacher},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {Visualization design for immediate high-level situational assessment},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {17--24},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379693},
  doi          = {10.1145/2379690.2379693},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Erbacher12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FangMK12,
  author       = {Wenbin Fang and
                  Barton P. Miller and
                  James A. Kupsch},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {Automated tracing and visualization of software security structure
                  and properties},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {9--16},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379692},
  doi          = {10.1145/2379690.2379692},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/FangMK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FischerFVMT12,
  author       = {Fabian Fischer and
                  Johannes Fuchs and
                  Pierre{-}Antoine Vervier and
                  Florian Mansmann and
                  Olivier Thonnard},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {VisTracer: a visual analytics tool to investigate routing anomalies
                  in traceroutes},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {80--87},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379701},
  doi          = {10.1145/2379690.2379701},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/FischerFVMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HarrisonSIDG12,
  author       = {Lane Harrison and
                  Riley Spahn and
                  Michael D. Iannacone and
                  Evan Downing and
                  John R. Goodall},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {{NV:} Nessus vulnerability visualization for the web},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379694},
  doi          = {10.1145/2379690.2379694},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/HarrisonSIDG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/InoueESSN12,
  author       = {Daisuke Inoue and
                  Masashi Eto and
                  Koei Suzuki and
                  Mio Suzuki and
                  Koji Nakao},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {{DAEDALUS-VIZ:} novel real-time 3D visualization for darknet monitoring-based
                  alert system},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {72--79},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379700},
  doi          = {10.1145/2379690.2379700},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/InoueESSN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LeschkeS12,
  author       = {Timothy R. Leschke and
                  Alan T. Sherman},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {Change-Link: a digital forensic tool for visualizing changes to directory
                  trees},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {48--55},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379697},
  doi          = {10.1145/2379690.2379697},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LeschkeS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MansmannGC12,
  author       = {Florian Mansmann and
                  Timo G{\"{o}}bel and
                  William R. Cheswick},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {Visual analysis of complex firewall configurations},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379691},
  doi          = {10.1145/2379690.2379691},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/MansmannGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SaxeMG12,
  author       = {Joshua Saxe and
                  David Mentis and
                  Christopher Greamo},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {Visualization of shared system call sequence relationships in large
                  malware corpora},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379695},
  doi          = {10.1145/2379690.2379695},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SaxeMG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/TsigkasTT12,
  author       = {Orestis Tsigkas and
                  Olivier Thonnard and
                  Dimitrios Tzovaras},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {Visual spam campaigns analysis using abstract graphs representation},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {64--71},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379699},
  doi          = {10.1145/2379690.2379699},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/TsigkasTT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/VerasTC12,
  author       = {Rafael Veras and
                  Julie Thorpe and
                  Christopher Collins},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {Visualizing semantics in passwords: the role of dates},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {88--95},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379702},
  doi          = {10.1145/2379690.2379702},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/VerasTC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ZhuoN12,
  author       = {Wei Zhuo and
                  Yacin Nadji},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {MalwareVis: entity-based visualization of malware network traces},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {41--47},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379696},
  doi          = {10.1145/2379690.2379696},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ZhuoN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2012,
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690},
  doi          = {10.1145/2379690},
  isbn         = {978-1-4503-1413-8},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BoschettiSMM11,
  author       = {Alberto Boschetti and
                  Luca Salgarelli and
                  Chris Muelder and
                  Kwan{-}Liu Ma},
  title        = {TVi: a visual querying system for network monitoring and anomaly detection},
  booktitle    = {8th International Symposium on Visualization for Cyber Security, VizSec
                  2011, Pittsburgh, PA, USA, July 20, 2011},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016904.2016905},
  doi          = {10.1145/2016904.2016905},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/BoschettiSMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HornD11,
  author       = {Chris Horn and
                  Anita D'Amico},
  title        = {Visual analysis of goal-directed network defense decisions},
  booktitle    = {8th International Symposium on Visualization for Cyber Security, VizSec
                  2011, Pittsburgh, PA, USA, July 20, 2011},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016904.2016909},
  doi          = {10.1145/2016904.2016909},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/HornD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/KintzelFM11,
  author       = {Christopher Kintzel and
                  Johannes Fuchs and
                  Florian Mansmann},
  title        = {Monitoring large {IP} spaces with ClockView},
  booktitle    = {8th International Symposium on Visualization for Cyber Security, VizSec
                  2011, Pittsburgh, PA, USA, July 20, 2011},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016904.2016906},
  doi          = {10.1145/2016904.2016906},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/KintzelFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/NatarajKJM11,
  author       = {Lakshmanan Nataraj and
                  S. Karthikeyan and
                  G. Jacob and
                  B. S. Manjunath},
  title        = {Malware images: visualization and automatic classification},
  booktitle    = {8th International Symposium on Visualization for Cyber Security, VizSec
                  2011, Pittsburgh, PA, USA, July 20, 2011},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016904.2016908},
  doi          = {10.1145/2016904.2016908},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/NatarajKJM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/RovetaCMZMC11,
  author       = {Francesco Roveta and
                  Giorgio Caviglia and
                  Luca Di Mario and
                  Stefano Zanero and
                  Federico Maggi and
                  Paolo Ciuccarelli},
  title        = {{BURN:} baring unknown rogue networks},
  booktitle    = {8th International Symposium on Visualization for Cyber Security, VizSec
                  2011, Pittsburgh, PA, USA, July 20, 2011},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016904.2016910},
  doi          = {10.1145/2016904.2016910},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/RovetaCMZMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SinghBEKAN11,
  author       = {Ankit Singh and
                  Lauren Bradel and
                  Alex Endert and
                  Robert Kincaid and
                  Christopher Andrews and
                  Chris North},
  title        = {Supporting the cyber analytic process using visual history on large
                  displays},
  booktitle    = {8th International Symposium on Visualization for Cyber Security, VizSec
                  2011, Pittsburgh, PA, USA, July 20, 2011},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016904.2016907},
  doi          = {10.1145/2016904.2016907},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SinghBEKAN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2011,
  title        = {8th International Symposium on Visualization for Cyber Security, VizSec
                  2011, Pittsburgh, PA, USA, July 20, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2016904},
  doi          = {10.1145/2016904},
  isbn         = {978-1-4503-0679-9},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BestBLWP10,
  author       = {Daniel M. Best and
                  Shawn Bohn and
                  Douglas Love and
                  Adam Wynne and
                  William A. Pike},
  editor       = {John Gerth},
  title        = {Real-time visualization of network behaviors for situational awareness},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850805},
  doi          = {10.1145/1850795.1850805},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/BestBLWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ChuILWB10,
  author       = {Matthew Chu and
                  Kyle Ingols and
                  Richard Lippmann and
                  Seth E. Webster and
                  Stephen W. Boyer},
  editor       = {John Gerth},
  title        = {Visualizing attack graphs, reachability, and trust relationships with
                  {NAVIGATOR}},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {22--33},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850798},
  doi          = {10.1145/1850795.1850798},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ChuILWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Glatz10,
  author       = {Eduard Glatz},
  editor       = {John Gerth},
  title        = {Visualizing host traffic through graphs},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850802},
  doi          = {10.1145/1850795.1850802},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Glatz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GoodallRH10,
  author       = {John R. Goodall and
                  Hassan Radwan and
                  Lenny Halseth},
  editor       = {John Gerth},
  title        = {Visual analysis of code security},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {46--51},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850800},
  doi          = {10.1145/1850795.1850800},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/GoodallRH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GuentherVS10,
  author       = {Jeffrey Guenther and
                  Fred Volk and
                  Mark Shaneck},
  editor       = {John Gerth},
  title        = {Proposing a multi-touch interface for intrusion detection environments},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {13--21},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850797},
  doi          = {10.1145/1850795.1850797},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/GuentherVS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HarrisonHYLWW10,
  author       = {Lane Harrison and
                  Xianlin Hu and
                  Xiaowei Ying and
                  Aidong Lu and
                  Weichao Wang and
                  Xintao Wu},
  editor       = {John Gerth},
  title        = {Interactive detection of network anomalies via coordinated multiple
                  views},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {91--101},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850806},
  doi          = {10.1145/1850795.1850806},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/HarrisonHYLWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LianMM10,
  author       = {Wilson Lian and
                  Fabian Monrose and
                  John McHugh},
  editor       = {John Gerth},
  title        = {Traffic classification using visual motifs: an empirical evaluation},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {70--78},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850804},
  doi          = {10.1145/1850795.1850804},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LianMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LiaoSC10,
  author       = {Qi Liao and
                  Aaron Striegel and
                  Nitesh V. Chawla},
  editor       = {John Gerth},
  title        = {Visualizing graph dynamics and similarity for enterprise network security
                  and management},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {34--45},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850799},
  doi          = {10.1145/1850795.1850799},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/LiaoSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/OehlerPK10,
  author       = {Michael Oehler and
                  Dhananjay S. Phatak and
                  F. John Krautheim},
  editor       = {John Gerth},
  title        = {Visualizing your key for secure phone calls and language independence},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {64--69},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850803},
  doi          = {10.1145/1850795.1850803},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/OehlerPK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/RasmussenERKGP10,
  author       = {Jamie C. Rasmussen and
                  Kate Ehrlich and
                  Steven I. Ross and
                  Susanna E. Kirk and
                  Daniel M. Gruen and
                  John F. Patterson},
  editor       = {John Gerth},
  title        = {Nimble cybersecurity incident management through visualization and
                  defensible recommendations},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {102--113},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850807},
  doi          = {10.1145/1850795.1850807},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/RasmussenERKGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WagnerWSDE10,
  author       = {Cynthia Wagner and
                  G{\'{e}}rard Wagener and
                  Radu State and
                  Alexandre Dulaunoy and
                  Thomas Engel},
  editor       = {John Gerth},
  title        = {PeekKernelFlows: peeking into {IP} flows},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {52--57},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850801},
  doi          = {10.1145/1850795.1850801},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/WagnerWSDE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YuLRB10,
  author       = {Tamara Yu and
                  Richard Lippmann and
                  James Riordan and
                  Stephen W. Boyer},
  editor       = {John Gerth},
  title        = {{EMBER:} a global perspective on extreme malicious behavior},
  booktitle    = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795.1850796},
  doi          = {10.1145/1850795.1850796},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/YuLRB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2010,
  editor       = {John Gerth},
  title        = {7th International Symposium on Visualization for Cyber Security, VizSec
                  2010, Ottawa, ON, Canada, September 14, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1850795},
  doi          = {10.1145/1850795},
  isbn         = {978-1-4503-0013-1},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BarreraO09,
  author       = {David Barrera and
                  Paul C. van Oorschot},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Security visualization tools and IPv6 addresses},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {21--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375538},
  doi          = {10.1109/VIZSEC.2009.5375538},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/BarreraO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Cheswick09,
  author       = {Bill Cheswick},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visual tools for security: Is there a there there?},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375533},
  doi          = {10.1109/VIZSEC.2009.5375533},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/Cheswick09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FinkNER09,
  author       = {Glenn A. Fink and
                  Christopher L. North and
                  Alex Endert and
                  Stuart Rose},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visualizing cyber security: Usable workspaces},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {45--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375542},
  doi          = {10.1109/VIZSEC.2009.5375542},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/FinkNER09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GlanfieldBTPSGM09,
  author       = {Joel Glanfield and
                  Stephen Brooks and
                  Teryl Taylor and
                  Diana Paterson and
                  Christopher Smith and
                  Carrie Gates and
                  John McHugh},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Over flow: An overview visualization for network analysis},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {11--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375536},
  doi          = {10.1109/VIZSEC.2009.5375536},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/GlanfieldBTPSGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Goodall09,
  author       = {John R. Goodall},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visualization is better! {A} comparative evaluation},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {57--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375543},
  doi          = {10.1109/VIZSEC.2009.5375543},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/Goodall09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Jankun-KellyWSFCS09,
  author       = {T. J. Jankun{-}Kelly and
                  David Wilson and
                  Andrew S. Stamps and
                  Josh Franck and
                  Jeffrey C. Carver and
                  J. Edward Swan II},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {A visual analytic framework for exploring relationships in textual
                  contents of digital forensics evidence},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {39--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375541},
  doi          = {10.1109/VIZSEC.2009.5375541},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/Jankun-KellyWSFCS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MorrisseyG09,
  author       = {Shaun P. Morrissey and
                  Georges G. Grinstein},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visualizing firewall configurations using created voids},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {75--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375546},
  doi          = {10.1109/VIZSEC.2009.5375546},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/MorrisseyG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/QuistL09,
  author       = {Daniel Quist and
                  Lorie M. Liebrock},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visualizing compiled executables for malware analysis},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {27--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375539},
  doi          = {10.1109/VIZSEC.2009.5375539},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/QuistL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SchweitzerBHM09,
  author       = {Dino Schweitzer and
                  Jeff Boleng and
                  Colin Hughes and
                  Louis Murphy},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visualizing keyboard pattern passwords},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {69--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375544},
  doi          = {10.1109/VIZSEC.2009.5375544},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/SchweitzerBHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/TriniusHGF09,
  author       = {Philipp Trinius and
                  Thorsten Holz and
                  Jan G{\"{o}}bel and
                  Felix C. Freiling},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visual analysis of malware behavior using treemaps and thread graphs},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {33--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375540},
  doi          = {10.1109/VIZSEC.2009.5375540},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/TriniusHGF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YelizarovG09,
  author       = {Anatoly Yelizarov and
                  Dennis Gamayunov},
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {Visualization of complex attacks and state of attacked network},
  booktitle    = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/VIZSEC.2009.5375527},
  doi          = {10.1109/VIZSEC.2009.5375527},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/YelizarovG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2009,
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5368324/proceeding},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BlueDFKS08,
  author       = {Ryan Blue and
                  Cody Dunne and
                  Adam Fuchs and
                  Kyle King and
                  Aaron Schulman},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Visualizing Real-Time Network Resource Usage},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {119--135},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_12},
  doi          = {10.1007/978-3-540-85933-8\_12},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/BlueDFKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BratusHPS08,
  author       = {Sergey Bratus and
                  Axel Hansen and
                  Fabio Pellacini and
                  Anna Shubina},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Backhoe, a Packet Trace and Log Browser},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {152--160},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_15},
  doi          = {10.1007/978-3-540-85933-8\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/BratusHPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ContiDSS08,
  author       = {Gregory J. Conti and
                  Erik Dean and
                  Matthew Sinda and
                  Benjamin Sangster},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Visual Reverse Engineering of Binary and Data Files},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_1},
  doi          = {10.1007/978-3-540-85933-8\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/ContiDSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FischerMKPW08,
  author       = {Fabian Fischer and
                  Florian Mansmann and
                  Daniel A. Keim and
                  Stephan Pietzko and
                  Marcel Waldvogel},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Large-Scale Network Monitoring for Visual Analysis of Attacks},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {111--118},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_11},
  doi          = {10.1007/978-3-540-85933-8\_11},
  timestamp    = {Wed, 10 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/FischerMKPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HeitzmannPPT08,
  author       = {Alexander Heitzmann and
                  Bernardo Palazzi and
                  Charalampos Papamanthou and
                  Roberto Tamassia},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Effective Visualization of File System Access-Control},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {18--25},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_2},
  doi          = {10.1007/978-3-540-85933-8\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/HeitzmannPPT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HomerVOM08,
  author       = {John Homer and
                  Ashok Varikuti and
                  Xinming Ou and
                  Miles A. McQueen},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Improving Attack Graph Visualization through Data Reduction and Attack
                  Grouping},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_7},
  doi          = {10.1007/978-3-540-85933-8\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/HomerVOM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Janies08,
  author       = {Jeff Janies},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Existence Plots: {A} Low-Resolution Time Series for Port Behavior
                  Analysis},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {161--168},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_16},
  doi          = {10.1007/978-3-540-85933-8\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/Janies08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Jankun-KellyFWCDS08,
  author       = {T. J. Jankun{-}Kelly and
                  Josh Franck and
                  David Wilson and
                  Jeffrey C. Carver and
                  David A. Dampier and
                  J. Edward Swan II},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Show Me How You See: Lessons from Studying Computer Forensics Experts
                  for Visualization},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {80--86},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_8},
  doi          = {10.1007/978-3-540-85933-8\_8},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/Jankun-KellyFWCDS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MinarikD08,
  author       = {Pavel Minar{\'{\i}}k and
                  Tom{\'{a}}s Dym{\'{a}}cek},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {NetFlow Data Visualization Based on Graphs},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {144--151},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_14},
  doi          = {10.1007/978-3-540-85933-8\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/MinarikD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MusaP08,
  author       = {Shahrulniza Musa and
                  David J. Parish},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Using Time Series 3D AlertGraph and False Alert Classification to
                  Analyse Snort Alerts},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {169--180},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_17},
  doi          = {10.1007/978-3-540-85933-8\_17},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/MusaP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/OHareNP08,
  author       = {Scott O'Hare and
                  Steven Noel and
                  Kenneth Prole},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {A Graph-Theoretic Visualization Approach to Network Risk Analysis},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {60--67},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_6},
  doi          = {10.1007/978-3-540-85933-8\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/OHareNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ProleGDK08,
  author       = {Kenneth Prole and
                  John R. Goodall and
                  Anita D. D'Amico and
                  Jason K. Kopylec},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Wireless Cyber Assets Discovery Visualization},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {136--143},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_13},
  doi          = {10.1007/978-3-540-85933-8\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/ProleGDK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SchwartzL08,
  author       = {Moses Schwartz and
                  Lorie M. Liebrock},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {A Term Distribution Visualization Approach to Digital Forensic String
                  Search},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {36--43},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_4},
  doi          = {10.1007/978-3-540-85933-8\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/SchwartzL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ShearerMK08,
  author       = {James Shearer and
                  Kwan{-}Liu Ma and
                  Toby Kohlenberg},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {BGPeep: An IP-Space Centered View for Internet Routing Data},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_10},
  doi          = {10.1007/978-3-540-85933-8\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/ShearerMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SuoZO08,
  author       = {Xiaoyuan Suo and
                  Ying Zhu and
                  G. Scott Owen},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {A Task Centered Framework for Computer Security Data Visualization},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {87--94},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_9},
  doi          = {10.1007/978-3-540-85933-8\_9},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/SuoZO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Vandenberghe08,
  author       = {Grant Vandenberghe},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Network Traffic Exploration Application: {A} Tool to Assess, Visualize,
                  and Analyze Network Security Events},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_18},
  doi          = {10.1007/978-3-540-85933-8\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/Vandenberghe08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WilliamsLI08,
  author       = {Leevar Williams and
                  Richard Lippmann and
                  Kyle Ingols},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {{GARNET:} {A} Graphical Attack Graph and Reachability Network Evaluation
                  Tool},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {44--59},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_5},
  doi          = {10.1007/978-3-540-85933-8\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/WilliamsLI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/XiaFO08,
  author       = {Ying H. Xia and
                  Kevin D. Fairbanks and
                  Henry L. Owen},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Visual Analysis of Program Flow Data with Data Propagation},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {26--35},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_3},
  doi          = {10.1007/978-3-540-85933-8\_3},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/XiaFO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2007,
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78243-8},
  doi          = {10.1007/978-3-540-78243-8},
  isbn         = {978-3-540-78242-1},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2008,
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8},
  doi          = {10.1007/978-3-540-85933-8},
  isbn         = {978-3-540-85931-4},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/DAmicoW07,
  author       = {Anita D. D'Amico and
                  K. Whitley},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {The Real Work of Computer Network Defense Analysts},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_2},
  doi          = {10.1007/978-3-540-78243-8\_2},
  timestamp    = {Wed, 08 Feb 2023 10:32:17 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/DAmicoW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ForestiA07,
  author       = {Stefano Foresti and
                  James Agutter},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {VisAlert: From Idea to Product},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_11},
  doi          = {10.1007/978-3-540-78243-8\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/ForestiA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Goodall07,
  author       = {John R. Goodall},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Introduction to Visualization for Computer Security},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_1},
  doi          = {10.1007/978-3-540-78243-8\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/Goodall07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/IrwinP07,
  author       = {Barry Irwin and
                  Nick Pilkington},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {High Level Internet Scale Traffic Visualization Using Hilbert Curve
                  Mapping},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {147--158},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_10},
  doi          = {10.1007/978-3-540-78243-8\_10},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/IrwinP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/IrwinR07,
  author       = {Barry Irwin and
                  Jean{-}Pierre van Riel},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Using InetVis to Evaluate Snort and Bro Scan Detection on a Network
                  Telescope},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {255--273},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_17},
  doi          = {10.1007/978-3-540-78243-8\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/IrwinR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LalanneBHB07,
  author       = {Denis Lalanne and
                  Enrico Bertini and
                  Patrick Hertzog and
                  P. Bados},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Visual Analysis of Corporate Network Intelligence: Abstracting and
                  Reasoning on Yesterdays for Acting Today},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {115--130},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_8},
  doi          = {10.1007/978-3-540-78243-8\_8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LalanneBHB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MansmanMK07,
  author       = {Florian Mansmann and
                  L. Meier and
                  Daniel A. Keim},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Visualization of Host Behavior for Network Security},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_13},
  doi          = {10.1007/978-3-540-78243-8\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/MansmanMK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MuelderCTMB07,
  author       = {Chris Muelder and
                  Lei Chen and
                  Russell Thomason and
                  Kwan{-}Liu Ma and
                  Tony Bartoletti},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Intelligent Classification and Visualization of Network Scans},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {237--253},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_16},
  doi          = {10.1007/978-3-540-78243-8\_16},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/MuelderCTMB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/PearlmanR07,
  author       = {Jason Pearlman and
                  Penny Rheingans},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented
                  Perspective},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {131--146},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_9},
  doi          = {10.1007/978-3-540-78243-8\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/PearlmanR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/PhanGLPW07,
  author       = {Doantam Phan and
                  John Gerth and
                  M. Lee and
                  Andreas Paepcke and
                  Terry Winograd},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Visual Analysis of Network Flow Data with Timelines and Event Plots},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {85--99},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_6},
  doi          = {10.1007/978-3-540-78243-8\_6},
  timestamp    = {Sun, 08 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/PhanGLPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/PikeSZ07,
  author       = {William A. Pike and
                  Chad Scherrer and
                  S. Zabriskie},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Putting Security in Context: Visual Correlation of Network Activity
                  with Real-World Information},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {203--220},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_14},
  doi          = {10.1007/978-3-540-78243-8\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/PikeSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SchweitzerBB07,
  author       = {Dino Schweitzer and
                  Leemon C. Baird III and
                  William L. Bahn},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Visually Understanding Jam Resistant Communication},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {175--186},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_12},
  doi          = {10.1007/978-3-540-78243-8\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/SchweitzerBB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/StollMGCE07,
  author       = {Jennifer Stoll and
                  Dave McColgin and
                  Michelle Gregory and
                  Vern Crow and
                  W. Keith Edwards},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Adapting Personas for Use in Security Visualization Design},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {39--52},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_3},
  doi          = {10.1007/978-3-540-78243-8\_3},
  timestamp    = {Thu, 20 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/StollMGCE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SuoZO07,
  author       = {Xiaoyuan Suo and
                  Ying Zhu and
                  G. Scott Owen},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Measuring the Complexity of Computer Security Visualization Designs},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {53--66},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_4},
  doi          = {10.1007/978-3-540-78243-8\_4},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/SuoZO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/TaylorBM07,
  author       = {Teryl Taylor and
                  Stephen Brooks and
                  John McHugh},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for
                  Identifying Intrusive Behavior},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {101--114},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_7},
  doi          = {10.1007/978-3-540-78243-8\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/TaylorBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WilliamsLI07,
  author       = {Leevar Williams and
                  Richard Lippmann and
                  Kyle Ingols},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {An Interactive Attack Graph Cascade and Reachability Display},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {221--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_15},
  doi          = {10.1007/978-3-540-78243-8\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/WilliamsLI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YuFBRC07,
  author       = {T. H. Yu and
                  Benjamin W. Fuller and
                  J. H. Bannick and
                  Lee M. Rossey and
                  Robert K. Cunningham},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Integrated Environment Management for Information Operations Testbeds},
  booktitle    = {4th International Workshop on Visualization for Computer Security,
                  VizSEC 2007, Sacramento, CA, USA, October 29, 2007},
  series       = {Mathematics and Visualization},
  pages        = {67--83},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78243-8\_5},
  doi          = {10.1007/978-3-540-78243-8\_5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/YuFBRC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AbdullahC06,
  author       = {Kulsoom Abdullah and
                  John A. Copeland},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Tool update: high alarm count issues in {IDS} rainstorm},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {61--62},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179587},
  doi          = {10.1145/1179576.1179587},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AbdullahC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HarropA06,
  author       = {Warren Harrop and
                  Grenville J. Armitage},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Real-time collaborative network monitoring and control using 3D game
                  engines for representation and interaction},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179583},
  doi          = {10.1145/1179576.1179583},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/HarropA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Hertzog06,
  author       = {Patrick Hertzog},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Visualizations to improve reactivity towards security incidents inside
                  corporate networks},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {95--102},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179596},
  doi          = {10.1145/1179576.1179596},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Hertzog06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LeeC06,
  author       = {Christopher P. Lee and
                  John A. Copeland},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Flowtag: a collaborative attack-analysis, reporting, and sharing tool
                  for security researchers},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {103--108},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179597},
  doi          = {10.1145/1179576.1179597},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LeeC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LiLK06,
  author       = {Lunquan Li and
                  Peng Liu and
                  George Kesidis},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Visual toolkit for network security experiment specification and data
                  analysis},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {7--14},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179579},
  doi          = {10.1145/1179576.1179579},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LiLK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MalecotKHS06,
  author       = {Erwan Le Mal{\'{e}}cot and
                  Masayoshi Kohara and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Interactively combining 2D and 3D visualization for network traffic
                  monitoring},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {123--127},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179600},
  doi          = {10.1145/1179576.1179600},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/MalecotKHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MathewGUSS06,
  author       = {Sunu Mathew and
                  Richard Giomundo and
                  Shambhu J. Upadhyaya and
                  Moises Sudit and
                  Adam Stotz},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Understanding multistage attacks by attack-track based visualization
                  of heterogeneous event streams},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179578},
  doi          = {10.1145/1179576.1179578},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/MathewGUSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/OberheideKB06,
  author       = {Jon Oberheide and
                  Manish Karir and
                  Dionysus Blazakis},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {{VAST:} visualizing autonomous system topology},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179592},
  doi          = {10.1145/1179576.1179592},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/OberheideKB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Ren06,
  author       = {Pin Ren},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Ensuring the continuing success of vizsec},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {67--70},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179591},
  doi          = {10.1145/1179576.1179591},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Ren06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/RenKG06,
  author       = {Pin Ren and
                  John Kristoff and
                  Bruce Gooch},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Visualizing {DNS} traffic},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179582},
  doi          = {10.1145/1179576.1179582},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/RenKG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SchweitzerB06,
  author       = {Dino Schweitzer and
                  Leemon C. Baird III},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Discovering an {RC4} anomaly through visualization},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {91--94},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179595},
  doi          = {10.1145/1179576.1179595},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SchweitzerB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ShabtaiKSE06,
  author       = {Asaf Shabtai and
                  Denis Klimov and
                  Yuval Shahar and
                  Yuval Elovici},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {An intelligent, interactive tool for exploration and visualization
                  of time-oriented security data},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179580},
  doi          = {10.1145/1179576.1179580},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/ShabtaiKSE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/StephanoG06,
  author       = {Amanda L. Stephano and
                  Dennis P. Groth},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {USEable security: interface design strategies for improving security},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {109--116},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179598},
  doi          = {10.1145/1179576.1179598},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/StephanoG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/TeohRNC06,
  author       = {Soon Tee Teoh and
                  Supranamaya Ranjan and
                  Antonio Nucci and
                  Chen{-}Nee Chuah},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {{BGP} eye: a new visualization tool for real-time detection and analysis
                  of {BGP} anomalies},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179593},
  doi          = {10.1145/1179576.1179593},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/TeohRNC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WangL06,
  author       = {Weichao Wang and
                  Aidong Lu},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Visualization assisted detection of sybil attacks in wireless networks},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179585},
  doi          = {10.1145/1179576.1179585},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/WangL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WrightMM06,
  author       = {Charles V. Wright and
                  Fabian Monrose and
                  Gerald M. Masson},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Using visual motifs to classify encrypted traffic},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179584},
  doi          = {10.1145/1179576.1179584},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/WrightMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Yee06,
  author       = {George Yee},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Visualization for privacy compliance},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {117--122},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179599},
  doi          = {10.1145/1179576.1179599},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Yee06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Yurcik06,
  author       = {William Yurcik},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Tool update: \emph{visflowconnect-IP} with advanced filtering from
                  usability testing},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {63--64},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179588},
  doi          = {10.1145/1179576.1179588},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Yurcik06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Yurcik06a,
  author       = {William Yurcik},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Tool update: \emph{NVisionIP} improvements (difference view, sparklines,
                  and shapes)},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {65--66},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179589},
  doi          = {10.1145/1179576.1179589},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Yurcik06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2006,
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576},
  doi          = {10.1145/1179576},
  isbn         = {1-59593-549-5},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/AbdullahLCCS05,
  author       = {Kulsoom Abdullah and
                  Christopher P. Lee and
                  Gregory J. Conti and
                  John A. Copeland and
                  John T. Stasko},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {{IDS} RainStorm: Visualizing {IDS} Alarms},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.8},
  doi          = {10.1109/VIZSEC.2005.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/AbdullahLCCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ContiGAO05,
  author       = {Gregory J. Conti and
                  Julian B. Grizzard and
                  Mustaque Ahamad and
                  Henry L. Owen},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Visual Exploration of Malicious Network Objects Using Semantic Zoom,
                  Interactive Encoding and Dynamic Queries},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {10},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.19},
  doi          = {10.1109/VIZSEC.2005.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ContiGAO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/DAmicoK05,
  author       = {Anita D'Amico and
                  Michael Kocka},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Information Assurance Visualizations for Specific Stages of Situational
                  Awareness and Intended Uses: Lessons Learned},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {13},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.13},
  doi          = {10.1109/VIZSEC.2005.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/DAmicoK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ErbacherCS05,
  author       = {Robert F. Erbacher and
                  Kim Christensen and
                  Amanda Sundberg},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Designing Visualization Capabilities for {IDS} Challenges},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {15},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.5},
  doi          = {10.1109/VIZSEC.2005.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ErbacherCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FinkMN05,
  author       = {Glenn A. Fink and
                  Paul Muessig and
                  Chris North},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Visual Correlation of Host Processes and Network Traffic},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {2},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.18},
  doi          = {10.1109/VIZSEC.2005.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/FinkMN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/FinkN05,
  author       = {Glenn A. Fink and
                  Chris North},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Root Polar Layout of Internet Address Data for Security Administration},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {7},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.23},
  doi          = {10.1109/VIZSEC.2005.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/FinkN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/GoodallLRK05,
  author       = {John R. Goodall and
                  Wayne G. Lutters and
                  Penny Rheingans and
                  Anita Komlodi},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Preserving the Big Picture: Visual Network Traffic Analysis with {TN}},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {6},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.17},
  doi          = {10.1109/VIZSEC.2005.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/GoodallLRK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/KoikeOK05,
  author       = {Hideki Koike and
                  Kazuhiro Ohno and
                  Kanba Koizumi},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Visualizing Cyber Attacks using {IP} Matrix},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {11},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.22},
  doi          = {10.1109/VIZSEC.2005.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/KoikeOK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/KomlodiRAGJ05,
  author       = {Anita Komlodi and
                  Penny Rheingans and
                  Utkarsha Ayachit and
                  John R. Goodall and
                  Amit Joshi},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {A User-centered Look at Glyph-based Security Visualization},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {3},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.1},
  doi          = {10.1109/VIZSEC.2005.1},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/KomlodiRAGJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LakkarajuBSYN05,
  author       = {Kiran Lakkaraju and
                  Ratna Bearavolu and
                  Adam J. Slagell and
                  William Yurcik and
                  Stephen C. North},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Closing-the-Loop in NVisionIP: Integrating Discovery and Search in
                  Security Visualizations},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {9},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.3},
  doi          = {10.1109/VIZSEC.2005.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LakkarajuBSYN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LeeTGBC05,
  author       = {Christopher P. Lee and
                  Jason Trost and
                  Nicholas Gibbs and
                  Raheem A. Beyah and
                  John A. Copeland},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Visual Firewall: Real-time Network Security Monito},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {16},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.20},
  doi          = {10.1109/VIZSEC.2005.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LeeTGBC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/MuelderMB05,
  author       = {Chris Muelder and
                  Kwan{-}Liu Ma and
                  Tony Bartoletti},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {A Visualization Methodology for Characterization of Network Scans},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {4},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.2},
  doi          = {10.1109/VIZSEC.2005.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/MuelderMB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/NoelJKJ05,
  author       = {Steven Noel and
                  Michael Jacobs and
                  Pramod Kalapa and
                  Sushil Jajodia},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Multiple Coordinated Views for Network Attack Graphs},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {12},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.14},
  doi          = {10.1109/VIZSEC.2005.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/NoelJKJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/OlineR05,
  author       = {Adam Oline and
                  Dirk Reiners},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Exploring Three-dimensional Visualization for Intrusion Detection},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {14},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.6},
  doi          = {10.1109/VIZSEC.2005.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/OlineR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/RenGLCW05,
  author       = {Pin Ren and
                  Yan Gao and
                  Zhichun Li and
                  Yan Chen and
                  Benjamin Watson},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {IDGraphs: Intrusion Detection and Analysis Using Histographs},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {5},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.7},
  doi          = {10.1109/VIZSEC.2005.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/RenGLCW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/X05,
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Title Page},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.12},
  doi          = {10.1109/VIZSEC.2005.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/X05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/X05a,
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Copyright},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.9},
  doi          = {10.1109/VIZSEC.2005.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/X05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/X05b,
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Preface},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.16},
  doi          = {10.1109/VIZSEC.2005.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/X05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/X05c,
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Committees},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.4},
  doi          = {10.1109/VIZSEC.2005.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/X05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YaoSTW05,
  author       = {Danfeng Yao and
                  Michael Shin and
                  Roberto Tamassia and
                  William H. Winsborough},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Visualization of Automated Trust Negotiation},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {8},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.21},
  doi          = {10.1109/VIZSEC.2005.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/YaoSTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2005,
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/10259/proceeding},
  isbn         = {0-7803-9477-1},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Axelsson04,
  author       = {Stefan Axelsson},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Combining a bayesian classifier with visualisation: understanding
                  the {IDS}},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {99--108},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029224},
  doi          = {10.1145/1029208.1029224},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Axelsson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/BallFN04,
  author       = {Robert Ball and
                  Glenn A. Fink and
                  Chris North},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Home-centric visualization of network traffic for security administration},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029217},
  doi          = {10.1145/1029208.1029217},
  timestamp    = {Wed, 04 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/BallFN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ColombeS04,
  author       = {Jeffrey B. Colombe and
                  Greg Stephens},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Statistical profiling and visualization for detection of malicious
                  insider attacks on computer networks},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {138--142},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029231},
  doi          = {10.1145/1029208.1029231},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/ColombeS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ContiA04,
  author       = {Gregory J. Conti and
                  Kulsoom Abdullah},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Passive visual fingerprinting of network attack tools},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {45--54},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029216},
  doi          = {10.1145/1029208.1029216},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ContiA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Goldring04,
  author       = {Thomas Goldring},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Scatter (and other) plots for visualizing user profiling data and
                  network traffic},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {119--123},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029227},
  doi          = {10.1145/1029208.1029227},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Goldring04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/KoikeO04,
  author       = {Hideki Koike and
                  Kazuhiro Ohno},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {SnortView: visualization system of snort logs},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {143--147},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029232},
  doi          = {10.1145/1029208.1029232},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/KoikeO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LakkarajuYL04,
  author       = {Kiran Lakkaraju and
                  William Yurcik and
                  Adam J. Lee},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {NVisionIP: netflow visualizations of system state for security situational
                  awareness},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {65--72},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029219},
  doi          = {10.1145/1029208.1029219},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/LakkarajuYL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LiHS04,
  author       = {Wei{-}Jen Li and
                  Shlomo Hershkop and
                  Salvatore J. Stolfo},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Email archive analysis through graphical visualization},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {128--132},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029229},
  doi          = {10.1145/1029208.1029229},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LiHS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/McPhersonMKBC04,
  author       = {Jonathan McPherson and
                  Kwan{-}Liu Ma and
                  Paul Krystosk and
                  Tony Bartoletti and
                  Marvin Christensen},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {PortVis: a tool for port-based detection of security events},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {73--81},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029220},
  doi          = {10.1145/1029208.1029220},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/McPhersonMKBC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/NoelJ04,
  author       = {Steven Noel and
                  Sushil Jajodia},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Managing attack graph complexity through visual hierarchical aggregation},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029225},
  doi          = {10.1145/1029208.1029225},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/NoelJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/PapadopoulosKSH04,
  author       = {Christos Papadopoulos and
                  Chris Kyriakakis and
                  Alexander A. Sawchuk and
                  Xinming He},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {CyberSeer: 3D audio-visual immersion for network security and management},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {90--98},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029223},
  doi          = {10.1145/1029208.1029223},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/PapadopoulosKSH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/PusaraB04,
  author       = {Maja Pusara and
                  Carla E. Brodley},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {User re-authentication via mouse movements},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029210},
  doi          = {10.1145/1029208.1029210},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/PusaraB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/TandonCM04,
  author       = {Gaurav Tandon and
                  Philip K. Chan and
                  Debasis Mitra},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {{MORPHEUS:} motif oriented representations to purge hostile events
                  from unlabeled sequences},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {16--25},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029212},
  doi          = {10.1145/1029208.1029212},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/TandonCM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/TeohZTMW04,
  author       = {Soon Tee Teoh and
                  Ke Zhang and
                  Shih{-}Ming Tseng and
                  Kwan{-}Liu Ma and
                  Shyhtsun Felix Wu},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Combining visual and automated data mining for near-real-time anomaly
                  detection and analysis in {BGP}},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029215},
  doi          = {10.1145/1029208.1029215},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vizsec/TeohZTMW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ValdesF04,
  author       = {Alfonso Valdes and
                  Martin W. Fong},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Scalable visualization of propagating internet phenomena},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {124--127},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029228},
  doi          = {10.1145/1029208.1029228},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ValdesF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WrightMM04,
  author       = {Charles V. Wright and
                  Fabian Monrose and
                  Gerald M. Masson},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {{HMM} profiles for network traffic classification},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {9--15},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029211},
  doi          = {10.1145/1029208.1029211},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/WrightMM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YinYTLL04,
  author       = {Xiaoxin Yin and
                  William Yurcik and
                  Michael Treaster and
                  Yifan Li and
                  Kiran Lakkaraju},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {VisFlowConnect: netflow visualizations of link relationships for security
                  situational awareness},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {26--34},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029214},
  doi          = {10.1145/1029208.1029214},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/YinYTLL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Yoo04,
  author       = {InSeon Yoo},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Visualizing windows executable viruses using self-organizing maps},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {82--89},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029222},
  doi          = {10.1145/1029208.1029222},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Yoo04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YurcikMK04,
  author       = {William Yurcik and
                  Xin Meng and
                  Nadir Kiyanclar},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {NVisionCC: a visualization framework for high performance cluster
                  security},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {133--137},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029230},
  doi          = {10.1145/1029208.1029230},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/YurcikMK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2004,
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208},
  doi          = {10.1145/1029208},
  isbn         = {1-58113-974-8},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}