default search action
Search dblp for Publications
export results for "stream:streams/conf/vizsec:"
@inproceedings{DBLP:conf/vizsec/CoppaILL23, author = {Emilio Coppa and Alessio Izzillo and Riccardo Lazzeretti and Simone Lenti}, title = {FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023, Melbourne, Australia, October 25, 2023}, pages = {1--11}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VizSec60606.2023.00007}, doi = {10.1109/VIZSEC60606.2023.00007}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/CoppaILL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/JohnsonGIGCC23, author = {Graham Johnson and Kenny Gruchalla and Michael Ingram and Nalinrat Guba and Robert Cruickshank III and Scott Caruso}, title = {Vis-SAGA: Visual Analytics for Situational Awareness of Grid Anomalies}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023, Melbourne, Australia, October 25, 2023}, pages = {17--21}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VizSec60606.2023.00009}, doi = {10.1109/VIZSEC60606.2023.00009}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/JohnsonGIGCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/JonesT23, author = {Rebecca Jones and Lucas Tate}, title = {Visualizing Comparisons of Bill of Materials}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023, Melbourne, Australia, October 25, 2023}, pages = {12--16}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VizSec60606.2023.00008}, doi = {10.1109/VIZSEC60606.2023.00008}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/JonesT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MillerSP23, author = {Thomas Miller and Miriam Sturdee and Daniel Prince}, title = {Exploring the Representation of Cyber-Risk Data Through Sketching}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023, Melbourne, Australia, October 25, 2023}, pages = {22--32}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VizSec60606.2023.00010}, doi = {10.1109/VIZSEC60606.2023.00010}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/MillerSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ParkerYL23, author = {Sam Parker and Haiyue Yuan and Shujun Li}, title = {PassViz: An Interactive Visualisation System for Analysing Leaked Passwords}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023, Melbourne, Australia, October 25, 2023}, pages = {33--42}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VizSec60606.2023.00011}, doi = {10.1109/VIZSEC60606.2023.00011}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ParkerYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2023, title = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2023, Melbourne, Australia, October 25, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VizSec60606.2023}, doi = {10.1109/VIZSEC60606.2023}, isbn = {979-8-3503-1793-0}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BhattacharjeeIV22, author = {Kaustav Bhattacharjee and Akm Islam and Jaideep Vaidya and Aritra Dasgupta}, title = {{PRIVEE:} {A} Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022, Oklahoma City, OK, USA, October 19, 2022}, pages = {1--11}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VizSec56996.2022.9941431}, doi = {10.1109/VIZSEC56996.2022.9941431}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/BhattacharjeeIV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/CherepanovUJK22, author = {Igor Cherepanov and Alex Ulmer and Jonathan Geraldi Joewono and J{\"{o}}rn Kohlhammer}, title = {Visualization Of Class Activation Maps To Explain {AI} Classification Of Network Packet Captures}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022, Oklahoma City, OK, USA, October 19, 2022}, pages = {1--11}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VizSec56996.2022.9941392}, doi = {10.1109/VIZSEC56996.2022.9941392}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/CherepanovUJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GuptaPCYSB22, author = {Kuhu Gupta and Aditeya Pandey and Larry Chan and Ambika Yadav and Brian Staats and Michelle A. Borkin}, title = {Portola: {A} Hybrid Tree and Network Visualization Technique for Network Segmentation}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022, Oklahoma City, OK, USA, October 19, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VizSec56996.2022.9941388}, doi = {10.1109/VIZSEC56996.2022.9941388}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/GuptaPCYSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/KomadinaMG22, author = {Adrian Komadina and Zeljka Mihajlovic and Stjepan Gros}, title = {Analysis of the Design Space for Cybersecurity Visualizations in VizSec}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022, Oklahoma City, OK, USA, October 19, 2022}, pages = {1--11}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VizSec56996.2022.9941422}, doi = {10.1109/VIZSEC56996.2022.9941422}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/KomadinaMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SchufrinLK22, author = {Marija Schufrin and Hendrik L{\"{u}}cke{-}Tieke and J{\"{o}}rn Kohlhammer}, title = {Visual Firewall Log Analysis - At the Border Between Analytical and Appealing}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022, Oklahoma City, OK, USA, October 19, 2022}, pages = {1--11}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VizSec56996.2022.9941462}, doi = {10.1109/VIZSEC56996.2022.9941462}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SchufrinLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2022, title = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2022, Oklahoma City, OK, USA, October 19, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VizSec56996.2022}, doi = {10.1109/VIZSEC56996.2022}, isbn = {978-1-6654-6148-1}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AngeliniBBLPSP21, author = {Marco Angelini and Graziano Blasilli and Silvia Bonomi and Simone Lenti and Alessia Palleschi and Giuseppe Santucci and Emiliano De Paoli}, title = {{BUCEPHALUS:} a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticS}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {15--25}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00007}, doi = {10.1109/VIZSEC53666.2021.00007}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AngeliniBBLPSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BohmEFP21, author = {Fabian B{\"{o}}hm and Ludwig Englbrecht and Sabrina Friedl and G{\"{u}}nther Pernul}, title = {Visual Decision-Support for Live Digital Forensics}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {58--67}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00012}, doi = {10.1109/VIZSEC53666.2021.00012}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/BohmEFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/DennigCPK21, author = {Frederik L. Dennig and Eren Cakmak and Henrik Plate and Daniel A. Keim}, title = {VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk Exposure}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {79--83}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00014}, doi = {10.1109/VIZSEC53666.2021.00014}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/DennigCPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Gove21, author = {Robert Gove}, title = {Automatic Narrative Summarization for Visualizing Cyber Security Logs and Incident Reports}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00005}, doi = {10.1109/VIZSEC53666.2021.00005}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Gove21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GrahamKMHK21, author = {Martin Graham and Robert Kukla and Oleksii Mandrychenko and Darren Hart and Jessie Kennedy}, title = {Developing Visualisations to Enhance an Insider Threat Product: {A} Case Study}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {47--57}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00011}, doi = {10.1109/VIZSEC53666.2021.00011}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/GrahamKMHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/JohnDLMPP21, author = {Mark F. St. John and Grit Denker and Peeter Laud and Karsten Martiny and Alisa Pankova and Dusko Pavlovic}, title = {Decision Support for Sharing Data using Differential Privacy}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {26--35}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00008}, doi = {10.1109/VIZSEC53666.2021.00008}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/JohnDLMPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/NadeemVY21, author = {Azqa Nadeem and Sicco Verwer and Shanchieh Jay Yang}, title = {{SAGE:} Intrusion Alert-driven Attack Graph Extractor}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {36--41}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00009}, doi = {10.1109/VIZSEC53666.2021.00009}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/NadeemVY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ReynoldsMAK21, author = {Steven Lamarr Reynolds and Tobias Mertz and Steven Arzt and J{\"{o}}rn Kohlhammer}, title = {User-Centered Design of Visualizations for Software Vulnerability Reports}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {68--78}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00013}, doi = {10.1109/VIZSEC53666.2021.00013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/ReynoldsMAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SchreiberSK21, author = {Andreas Schreiber and Tim Sonnekalb and Lynn von Kurnatowski}, title = {Towards Visual Analytics Dashboards for Provenance-driven Static Application Security Testing}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {42--46}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00010}, doi = {10.1109/VIZSEC53666.2021.00010}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SchreiberSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SopanB21, author = {Awalin Sopan and Konstantin Berlin}, title = {{AI} Total: Analyzing Security {ML} Models with Imperfect Data in Production}, booktitle = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, pages = {10--14}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021.00006}, doi = {10.1109/VIZSEC53666.2021.00006}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SopanB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2021, title = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021, New Orleans, LA, USA, October 27, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VizSec53666.2021}, doi = {10.1109/VIZSEC53666.2021}, isbn = {978-1-6654-2085-3}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AlperinWG20, author = {Kenneth B. Alperin and Allan B. Wollaber and Steven R. Gomez}, editor = {J{\"{o}}rn Kohlhammer and Marco Angelini and Chris Bryan and Rosa Romero G{\'{o}}mez and Nicolas Prigent}, title = {Improving Interpretability for Cyber Vulnerability Assessment Using Focus and Context Visualizations}, booktitle = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2020, Virtual Event, USA, October 28, 2020}, pages = {30--39}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VizSec51108.2020.00011}, doi = {10.1109/VIZSEC51108.2020.00011}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/AlperinWG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BeckerD0E20, author = {Franziska Becker and Arthur Drichel and Christoph M{\"{u}}ller and Thomas Ertl}, editor = {J{\"{o}}rn Kohlhammer and Marco Angelini and Chris Bryan and Rosa Romero G{\'{o}}mez and Nicolas Prigent}, title = {Interpretable Visualizations of Deep Neural Networks for Domain Generation Algorithm Detection}, booktitle = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2020, Virtual Event, USA, October 28, 2020}, pages = {25--29}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VizSec51108.2020.00010}, doi = {10.1109/VIZSEC51108.2020.00010}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/BeckerD0E20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BeranHKOZ20, author = {Michal Beran and Frantisek Hrdina and Daniel Kouril and Radek Oslejsek and Krist{\'{\i}}na Z{\'{a}}kopcanov{\'{a}}}, editor = {J{\"{o}}rn Kohlhammer and Marco Angelini and Chris Bryan and Rosa Romero G{\'{o}}mez and Nicolas Prigent}, title = {Exploratory Analysis of File System Metadata for Rapid Investigation of Security Incidents}, booktitle = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2020, Virtual Event, USA, October 28, 2020}, pages = {11--20}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VizSec51108.2020.00008}, doi = {10.1109/VIZSEC51108.2020.00008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/BeranHKOZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ChaffeyS20, author = {Emily J. Chaffey and Daniele Sgandurra}, editor = {J{\"{o}}rn Kohlhammer and Marco Angelini and Chris Bryan and Rosa Romero G{\'{o}}mez and Nicolas Prigent}, title = {Malware vs Anti-Malware Battle - Gotta Evade 'em All!}, booktitle = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2020, Virtual Event, USA, October 28, 2020}, pages = {40--44}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VizSec51108.2020.00012}, doi = {10.1109/VIZSEC51108.2020.00012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ChaffeyS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/PengSJSWMRFBW20, author = {Chao Peng and David I. Schwartz and Daryl Johnson and Bill Stackpole and Chad Weeden and Jacob Marcovecchio and Drake Richards and Chris Fogle and Christopher Brown and Victoria Walrond}, editor = {J{\"{o}}rn Kohlhammer and Marco Angelini and Chris Bryan and Rosa Romero G{\'{o}}mez and Nicolas Prigent}, title = {Visualization for Spectators in Cybersecurity Competitions}, booktitle = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2020, Virtual Event, USA, October 28, 2020}, pages = {21--24}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VizSec51108.2020.00009}, doi = {10.1109/VIZSEC51108.2020.00009}, timestamp = {Sat, 20 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/PengSJSWMRFBW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SchufrinRKK20, author = {Marija Schufrin and Steven Lamarr Reynolds and Arjan Kuijper and J{\"{o}}rn Kohlhammer}, editor = {J{\"{o}}rn Kohlhammer and Marco Angelini and Chris Bryan and Rosa Romero G{\'{o}}mez and Nicolas Prigent}, title = {A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet}, booktitle = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2020, Virtual Event, USA, October 28, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VizSec51108.2020.00007}, doi = {10.1109/VIZSEC51108.2020.00007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SchufrinRKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2020, editor = {J{\"{o}}rn Kohlhammer and Marco Angelini and Chris Bryan and Rosa Romero G{\'{o}}mez and Nicolas Prigent}, title = {17th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2020, Virtual Event, USA, October 28, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VizSec51108.2020}, doi = {10.1109/VIZSEC51108.2020}, isbn = {978-1-7281-8262-9}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AngeliniBBCDDLN19, author = {Marco Angelini and Graziano Blasilli and Luca Borzacchiello and Emilio Coppa and Daniele Cono D'Elia and Camil Demetrescu and Simone Lenti and Simone Nicchi and Giuseppe Santucci}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {SymNav: Visually Assisting Symbolic Execution}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--11}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161524}, doi = {10.1109/VIZSEC48167.2019.9161524}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AngeliniBBCDDLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/DasguptaK019, author = {Aritra Dasgupta and Robert Kosara and Min Chen}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {Guess Me If You Can: {A} Visual Uncertainty Model for Transparent Evaluation of Disclosure Risks in Privacy-Preserving Data Visualization}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161608}, doi = {10.1109/VIZSEC48167.2019.9161608}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/DasguptaK019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FoussRWG19, author = {Brett Fouss and Dennis M. Ross and Allan B. Wollaber and Steven R. Gomez}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {PunyVis: {A} Visual Analytics Approach for Identifying Homograph Phishing Attacks}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161590}, doi = {10.1109/VIZSEC48167.2019.9161590}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/FoussRWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GuerraVC19, author = {Jorge L. Guerra and Eduardo E. Veas and Carlos Adri{\'{a}}n Catania}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {A Study on Labeling Network Hostile Behavior with Intelligent Interactive Tools}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161489}, doi = {10.1109/VIZSEC48167.2019.9161489}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/GuerraVC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Laughlin0SE19, author = {Brandon Laughlin and Christopher Collins and Karthik Sankaranarayanan and Khalil El{-}Khatib}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {A Visual Analytics Framework for Adversarial Text Generation}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161563}, doi = {10.1109/VIZSEC48167.2019.9161563}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Laughlin0SE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/OShaughnessy19, author = {Stephen O'Shaughnessy}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {Image-based Malware Classification: {A} Space Filling Curve Approach}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161583}, doi = {10.1109/VIZSEC48167.2019.9161583}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/OShaughnessy19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/OslejsekRBSV19, author = {Radek Oslejsek and V{\'{\i}}t Rusn{\'{a}}k and Karol{\'{\i}}na Dockalov{\'{a}} Bursk{\'{a}} and Valdemar Sv{\'{a}}bensk{\'{y}} and Jan Vykopal}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--11}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161386}, doi = {10.1109/VIZSEC48167.2019.9161386}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/OslejsekRBSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SubramanianPLL19, author = {Siva Sandeep Subramanian and Parab Pushparaj and Zerong Liu and Aidong Lu}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {Explainable Visualization of Collaborative Vandal Behaviors in Wikipedia}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161504}, doi = {10.1109/VIZSEC48167.2019.9161504}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SubramanianPLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/UlmerSK19, author = {Alex Ulmer and David Sessler and J{\"{o}}rn Kohlhammer}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {NetCapVis: Web-based Progressive Visual Analytics for Network Packet Captures}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161633}, doi = {10.1109/VIZSEC48167.2019.9161633}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/UlmerSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/VargaWT19, author = {Margaret Varga and Carsten Winkelholz and Susan Tr{\"{a}}ber{-}Burdin}, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {An Exploration of Cyber Symbology}, booktitle = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VizSec48167.2019.9161577}, doi = {10.1109/VIZSEC48167.2019.9161577}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/VargaWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2019, editor = {Robert Gove and Dustin Arendt and J{\"{o}}rn Kohlhammer and Marco Angelini and Celeste Lyn Paul and Chris Bryan and Sean McKenna and Nicolas Prigent and Parnian Najafi and Awalin Sopan}, title = {16th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2019, Vancouver, BC, Canada, October 23, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/9154509/proceeding}, isbn = {978-1-7281-3876-3}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AngeliniBBCDFLS18, author = {Marco Angelini and Graziano Blasilli and Pietro Borrello and Emilio Coppa and Daniele Cono D'Elia and Serena Ferracci and Simone Lenti and Giuseppe Santucci}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {ROPMate: Visually Assisting the Creation of ROP-based Exploits}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709204}, doi = {10.1109/VIZSEC.2018.8709204}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/AngeliniBBCDFLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ArendtFYBL18, author = {Dustin Lockhart Arendt and Lyndsey R. Franklin and Fumeng Yang and Brooke R. Brisbois and Ryan R. LaMothe}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {Crush Your Data with ViC\({}^{\mbox{2}}\)ES Then {CHISSL} Away}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709212}, doi = {10.1109/VIZSEC.2018.8709212}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/ArendtFYBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BakirtzisSFE18, author = {Georgios Bakirtzis and Brandon J. Simon and Cody H. Fleming and Carl R. Elks}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709187}, doi = {10.1109/VIZSEC.2018.8709187}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/BakirtzisSFE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/CappersMEW18, author = {Bram C. M. Cappers and Paulus N. Meessen and Sandro Etalle and Jarke J. van Wijk}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709230}, doi = {10.1109/VIZSEC.2018.8709230}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/CappersMEW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ChenCAANTTY18, author = {Siming Chen and Shuai Chen and Natalia V. Andrienko and Gennady L. Andrienko and Phong H. Nguyen and Cagatay Turkay and Olivier Thonnard and Xiaoru Yuan}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {User Behavior Map: Visual Exploration for Cyber Security Session Data}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709223}, doi = {10.1109/VIZSEC.2018.8709223}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ChenCAANTTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ChouBLM18, author = {Jia{-}Kai Chou and Chris Bryan and Jing Li and Kwan{-}Liu Ma}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {An Empirical Study on Perceptually Masking Privacy in Graph Visualizations}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709181}, doi = {10.1109/VIZSEC.2018.8709181}, timestamp = {Wed, 15 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/ChouBLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GoveD18, author = {Robert Gove and Lauren Deason}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {Visualizing Automatically Detected Periodic Network Activity}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709177}, doi = {10.1109/VIZSEC.2018.8709177}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/GoveD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/KrokosRWV18, author = {Eric Krokos and Alexander Rowden and Kirsten Whitley and Amitabh Varshney}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {Visual Analytics for Root {DNS} Data}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709205}, doi = {10.1109/VIZSEC.2018.8709205}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/KrokosRWV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SopanBMK18, author = {Awalin Sopan and Matthew Berninger and Murali Mulakaluri and Raj Katakam}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the {SOC}}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709231}, doi = {10.1109/VIZSEC.2018.8709231}, timestamp = {Wed, 15 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/SopanBMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/UlmerSSK18, author = {Alex Ulmer and Marija Schufrin and David Sessler and J{\"{o}}rn Kohlhammer}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709182}, doi = {10.1109/VIZSEC.2018.8709182}, timestamp = {Wed, 15 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/UlmerSSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YangCMBS18, author = {Yifan Yang and John P. Collomosse and Arthi Kanchana Manohar and Jo Briggs and Jamie Steane}, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {{TAPESTRY:} Visualizing Interwoven Identities for Trust Provenance}, booktitle = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VIZSEC.2018.8709236}, doi = {10.1109/VIZSEC.2018.8709236}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/YangCMBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2018, editor = {Diane Staheli and Celeste Lyn Paul and J{\"{o}}rn Kohlhammer and Daniel M. Best and Stoney Trent and Nicolas Prigent and Robert Gove and Graig Sauer}, title = {15th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8706256/proceeding}, isbn = {978-1-5386-8194-7}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AngeliniALSU17, author = {Marco Angelini and Leonardo Aniello and Simone Lenti and Giuseppe Santucci and Daniele Ucci}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062199}, doi = {10.1109/VIZSEC.2017.8062199}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/AngeliniALSU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AngeliniLS17, author = {Marco Angelini and Simone Lenti and Giuseppe Santucci}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {{CRUMBS:} {A} cyber security framework browser}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062194}, doi = {10.1109/VIZSEC.2017.8062194}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AngeliniLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FranklinPBDF17, author = {Lyndsey Franklin and Meg Pirrung and Leslie M. Blaha and Michelle Dowling and Mi Feng}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {Toward a visualization-supported workflow for cyber alert management using threat models and human-centered design}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062200}, doi = {10.1109/VIZSEC.2017.8062200}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/FranklinPBDF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GomezNA17, author = {Rosa Romero G{\'{o}}mez and Yacin Nadji and Manos Antonakakis}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {Towards designing effective visualizations for DNS-based network threat analysis}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062201}, doi = {10.1109/VIZSEC.2017.8062201}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/GomezNA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/KimKKK17, author = {Hyungseok Kim and Sukjun Ko and Dong Seong Kim and Huy Kang Kim}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {Firewall ruleset visualization analysis tool based on segmentation}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062196}, doi = {10.1109/VIZSEC.2017.8062196}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/KimKKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LeichtnamTPM17, author = {Laetitia Leichtnam and Eric Totel and Nicolas Prigent and Ludovic M{\'{e}}}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {{STARLORD:} Linked security data exploration in a 3D graph}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062203}, doi = {10.1109/VIZSEC.2017.8062203}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LeichtnamTPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/NortonQ17, author = {Andrew P. Norton and Yanjun Qi}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {Adversarial-Playground: {A} visualization suite showing how adversarial examples fool deep learning}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062202}, doi = {10.1109/VIZSEC.2017.8062202}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/NortonQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SanthanamHKM17, author = {Ganesh Ram Santhanam and Benjamin Holland and Suresh C. Kothari and Jon Mathews}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {Interactive visualization toolbox to detect sophisticated android malware}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062197}, doi = {10.1109/VIZSEC.2017.8062197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SanthanamHKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SethiW17, author = {Aneesha Sethi and Gary B. Wills}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {Expert-interviews led analysis of EEVi - {A} model for effective visualization in cyber-security}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062195}, doi = {10.1109/VIZSEC.2017.8062195}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SethiW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TheronMCF17, author = {Roberto Ther{\'{o}}n and Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and Jos{\'{e}} Camacho and Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez}, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {Network-wide intrusion detection supported by multivariate analysis and interactive visualization}, booktitle = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/VIZSEC.2017.8062198}, doi = {10.1109/VIZSEC.2017.8062198}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/TheronMCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2017, editor = {Sophie Engle and Diane Staheli and Celeste Lyn Paul and Simon Walton and Nicolas Prigent and Robert Gove and Lane Harrison}, title = {14th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2017, Phoenix, AZ, USA, October 2, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8052583/proceeding}, isbn = {978-1-5386-2693-1}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AlamGJ16, author = {Md. Jawaherul Alam and Michael T. Goodrich and Timothy Johnson}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739575}, doi = {10.1109/VIZSEC.2016.7739575}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AlamGJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AnhNUK16, author = {Huynh Ngoc Anh and Wee Keong Ng and Alex Ulmer and J{\"{o}}rn Kohlhammer}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {Uncovering periodic network signals of cyber attacks}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739581}, doi = {10.1109/VIZSEC.2016.7739581}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AnhNUK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ArendtBBP16, author = {Dustin Arendt and Daniel M. Best and Russ Burtner and Celeste Lyn Paul}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {CyberPetri at {CDX} 2016: Real-time network situation awareness}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739584}, doi = {10.1109/VIZSEC.2016.7739584}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ArendtBBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AssalCB16, author = {Hala Assal and Sonia Chiasson and Robert Biddle}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {Cesar: Visual representation of source code vulnerabilities}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739576}, doi = {10.1109/VIZSEC.2016.7739576}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AssalCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AupetitZVDB16, author = {Micha{\"{e}}l Aupetit and Yury Zhauniarovich and Giorgos Vasiliadis and Marc Dacier and Yazan Boshmaf}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {Visualization of actionable knowledge to mitigate DRDoS attacks}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739577}, doi = {10.1109/VIZSEC.2016.7739577}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AupetitZVDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BuchananDK16, author = {Laurin Buchanan and Anita D'Amico and Drew Kirkpatrick}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739578}, doi = {10.1109/VIZSEC.2016.7739578}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/BuchananDK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/CappersW16, author = {Bram C. M. Cappers and Jarke J. van Wijk}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {Understanding the context of network traffic alerts}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739579}, doi = {10.1109/VIZSEC.2016.7739579}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/CappersW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Gove16, author = {Robert Gove}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {{V3SPA:} {A} visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policies}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739580}, doi = {10.1109/VIZSEC.2016.7739580}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Gove16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/PerytMCVMC16, author = {Sebastian Peryt and Jose Andre Morales and William Casey and Aaron Volkmann and Bud Mishra and Yang Cai}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {Visualizing a Malware Distribution Network}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739585}, doi = {10.1109/VIZSEC.2016.7739585}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/PerytMCVMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/PostWBHMH16, author = {Tobias Post and Thomas Wischgoll and Adam R. Bryant and Bernd Hamann and Paul M{\"{u}}ller and Hans Hagen}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {Visually guided flow tracking in software-defined networking}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739586}, doi = {10.1109/VIZSEC.2016.7739586}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/PostWBHMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SiadatiSM16, author = {Hossein Siadati and Bahador Saket and Nasir D. Memon}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {Detecting malicious logins in enterprise networks using visualization}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739582}, doi = {10.1109/VIZSEC.2016.7739582}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SiadatiSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SyamkumarDB16, author = {Meenakshi Syamkumar and Ramakrishnan Durairajan and Paul Barford}, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {Bigfoot: {A} geo-based visualization methodology for detecting {BGP} threats}, booktitle = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/VIZSEC.2016.7739583}, doi = {10.1109/VIZSEC.2016.7739583}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SyamkumarDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2016, editor = {Daniel M. Best and Diane Staheli and Nicolas Prigent and Sophie Engle and Lane Harrison}, title = {13th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7701173/proceeding}, isbn = {978-1-5090-1605-1}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AngeliniPS15, author = {Marco Angelini and Nicolas Prigent and Giuseppe Santucci}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {{PERCIVAL:} proactive and reactive attack and response assessment for cyber incidents using visual analytics}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312764}, doi = {10.1109/VIZSEC.2015.7312764}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AngeliniPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ArendtBBBGPP15, author = {Dustin Lockhart Arendt and Russ Burtner and Daniel M. Best and Nathan D. Bos and John R. Gersh and Christine D. Piatko and Celeste Lyn Paul}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {Ocelot: user-centered design of a decision support visualization for network quarantine}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312763}, doi = {10.1109/VIZSEC.2015.7312763}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ArendtBBBGPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BattistaDPPRT15, author = {Giuseppe Di Battista and Valentino Di Donato and Maurizio Patrignani and Maurizio Pizzonia and Vincenzo Roselli and Roberto Tamassia}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {Bitconeview: visualization of flows in the bitcoin transaction graph}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312773}, doi = {10.1109/VIZSEC.2015.7312773}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/BattistaDPPRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/CappersW15, author = {Bram C. M. Cappers and Jarke J. van Wijk}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {{SNAPS:} Semantic network traffic analysis through projection and selection}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312768}, doi = {10.1109/VIZSEC.2015.7312768}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/CappersW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GrayRR15, author = {Cameron C. Gray and Panagiotis D. Ritsos and Jonathan C. Roberts}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {Contextual network navigation to provide situational awareness for network administrators}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312769}, doi = {10.1109/VIZSEC.2015.7312769}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/GrayRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HaoHH15, author = {Lihua Hao and Christopher G. Healey and Steve E. Hutchinson}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {Ensemble visualization for cyber situation awareness of network security data}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312766}, doi = {10.1109/VIZSEC.2015.7312766}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/HaoHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Legg15, author = {Philip A. Legg}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {Visualizing the insider threat: challenges and tools for identifying malicious user activity}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312772}, doi = {10.1109/VIZSEC.2015.7312772}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Legg15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/McKennaSM15, author = {Sean McKenna and Diane Staheli and Miriah D. Meyer}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {Unlocking user-centered design methods for building cyber security visualizations}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312771}, doi = {10.1109/VIZSEC.2015.7312771}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/McKennaSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WaltonMC15, author = {Simon J. Walton and Eamonn Maguire and Min Chen}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {A visual analytics loop for supporting model development}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312767}, doi = {10.1109/VIZSEC.2015.7312767}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/WaltonMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WebgaL15, author = {Kodzo Wegba and Aidong Lu}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {Discovery of rating fraud with real-time streaming visual analytics}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312770}, doi = {10.1109/VIZSEC.2015.7312770}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/WebgaL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YuenTH15, author = {Joseph Yuen and Benjamin P. Turnbull and Justin Hernandez}, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {Visual analytics for cyber red teaming}, booktitle = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/VIZSEC.2015.7312765}, doi = {10.1109/VIZSEC.2015.7312765}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/YuenTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2015, editor = {Lane Harrison and Nicolas Prigent and Sophie Engle and Daniel M. Best}, title = {12th {IEEE} Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, October 25, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7310645/proceeding}, isbn = {978-1-4673-7599-3}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BestEK14, author = {Daniel M. Best and Alex Endert and Daniel Kidwell}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {7 key challenges for visualization in cyber network defense}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {33--40}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671497}, doi = {10.1145/2671491.2671497}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/BestEK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ChenGYMSE14, author = {Siming Chen and Cong Guo and Xiaoru Yuan and Fabian Merkle and Hanna Sch{\"{a}}fer and Thomas Ertl}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {{OCEANS:} online collaborative explorative analysis on network security}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {1--8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671493}, doi = {10.1145/2671491.2671493}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ChenGYMSE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FischerK14, author = {Fabian Fischer and Daniel A. Keim}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {NStreamAware: real-time visual analytics for data streams to enhance situational awareness}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {65--72}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671495}, doi = {10.1145/2671491.2671495}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/FischerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FowlerJSSAKL14, author = {J. Joseph Fowler and Thienne M. Johnson and Paolo Simonetto and Michael Schneider and Carlos Acedo and Stephen G. Kobourov and Loukas Lazos}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {IMap: visualizing network activity over internet maps}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {80--87}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671501}, doi = {10.1145/2671491.2671501}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/FowlerJSSAKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GoveSGLB14, author = {Robert Gove and Joshua Saxe and Sigfried Gold and Alexander Long and Giacomo Bergamo}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {{SEEM:} a scalable visualization for comparing multiple large sets of attributes for malware analysis}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {72--79}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671496}, doi = {10.1145/2671491.2671496}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/GoveSGLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HumphriesPBM14, author = {Christopher Humphries and Nicolas Prigent and Christophe Bidan and Fr{\'{e}}d{\'{e}}ric Majorczyk}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {{CORGI:} combination, organization and reconstruction through graphical interactions}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {57--64}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671494}, doi = {10.1145/2671491.2671494}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/HumphriesPBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LongSG14, author = {Alexander Long and Joshua Saxe and Robert Gove}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {Detecting malware samples with similar image sets}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {88--95}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671500}, doi = {10.1145/2671491.2671500}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/LongSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/StaheliYCDNOMH14, author = {Diane Staheli and Tamara Yu and R. Jordan Crouser and Suresh Damodaran and Kevin Nam and B. David O'Gwynn and Sean McKenna and Lane Harrison}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {Visualization evaluation for cyber security: trends and future directions}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {49--56}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671492}, doi = {10.1145/2671491.2671492}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/StaheliYCDNOMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/StangeDLW14, author = {Jan{-}Erik Stange and Marian D{\"{o}}rk and Johannes Landstorfer and Reto Wettach}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {Visual filter: graphical exploration of network security log files}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {41--48}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671503}, doi = {10.1145/2671491.2671503}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/StangeDLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WagnerARDKLT14, author = {Markus Wagner and Wolfgang Aigner and Alexander Rind and Hermann Dornhackl and Konstantin Kadletz and Robert Luh and Paul Tavolato}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {9--16}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671498}, doi = {10.1145/2671491.2671498}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/WagnerARDKLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WaltonMC14, author = {Simon J. Walton and Eamonn Maguire and Min Chen}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {Multiple queries with conditional attributes (QCATs) for anomaly detection and visualization}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {17--24}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671502}, doi = {10.1145/2671491.2671502}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/WaltonMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WuchnerPO14, author = {Tobias W{\"{u}}chner and Alexander Pretschner and Mart{\'{\i}}n Ochoa}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {{DAVAST:} data-centric system level activity visualization}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {25--32}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671499}, doi = {10.1145/2671491.2671499}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/WuchnerPO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2014, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491}, doi = {10.1145/2671491}, isbn = {978-1-4503-2826-5}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/0002TT13, author = {Stavros Papadopoulos and Georgios Theodoridis and Dimitrios Tzovaras}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {BGPfuse: using visual feature fusion for the detection and attribution of {BGP} anomalies}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {57--64}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517965}, doi = {10.1145/2517957.2517965}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/0002TT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AlsalehAAA13, author = {Mansour Alsaleh and Abdullah Alqahtani and Abdulrahman Alarifi and AbdulMalik S. Al{-}Salman}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {Visualizing {PHPIDS} log files for better understanding of web server attacks}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {1--8}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517958}, doi = {10.1145/2517957.2517958}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AlsalehAAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HaoHH13, author = {Lihua Hao and Christopher G. Healey and Steve E. Hutchinson}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {Flexible web visualization for alert-based network security analytics}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {33--40}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517962}, doi = {10.1145/2517957.2517962}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/HaoHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HumphriesPBM13, author = {Christopher Humphries and Nicolas Prigent and Christophe Bidan and Fr{\'{e}}d{\'{e}}ric Majorczyk}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {{ELVIS:} Extensible Log VISualization}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {9--16}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517959}, doi = {10.1145/2517957.2517959}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/HumphriesPBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/KarapistoliSE13, author = {Eirini D. Karapistoli and Panagiotis G. Sarigiannidis and Anastasios A. Economides}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {{SRNET:} a real-time, cross-based anomaly detection and visualization system for wireless sensor networks}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {49--56}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517964}, doi = {10.1145/2517957.2517964}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/KarapistoliSE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LeschkeN13, author = {Timothy R. Leschke and Charles K. Nicholas}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {Change-link 2.0: a digital forensic tool for visualizing changes to shadow volume data}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {17--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517960}, doi = {10.1145/2517957.2517960}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LeschkeN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MatuszakDS13, author = {William J. Matuszak and Lisa Cingiser DiPippo and Yan Lindsay Sun}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {CyberSAVe: situational awareness visualization for cyber security of smart grid systems}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {25--32}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517961}, doi = {10.1145/2517957.2517961}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/MatuszakDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/NunnallyAUCB13, author = {Troy J. Nunnally and Kulsoom Abdullah and A. Selcuk Uluagac and John A. Copeland and Raheem A. Beyah}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {\emph{NAVSEC}: a recommender system for 3D network security visualizations}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {41--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517963}, doi = {10.1145/2517957.2517963}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/NunnallyAUCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/StoffelFK13, author = {Florian Stoffel and Fabian Fischer and Daniel A. Keim}, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {Finding anomalies in time-series using visual correlation for interactive root cause analysis}, booktitle = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, pages = {65--72}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957.2517966}, doi = {10.1145/2517957.2517966}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/StoffelFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2013, editor = {John R. Goodall and Kwan{-}Liu Ma and Sophie Engle and Fabian Fischer}, title = {10th Workshop on Visualization for Cyber Security, VizSec 2013, Atlanta, GA, USA, October 14, 2013}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517957}, doi = {10.1145/2517957}, isbn = {978-1-4503-2173-0}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/EngleW12, author = {Sophie Engle and Sean Whalen}, editor = {Dino Schweitzer and Daniel Quist}, title = {Visualizing distributed memory computations with hive plots}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {56--63}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379698}, doi = {10.1145/2379690.2379698}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/EngleW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Erbacher12, author = {Robert F. Erbacher}, editor = {Dino Schweitzer and Daniel Quist}, title = {Visualization design for immediate high-level situational assessment}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {17--24}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379693}, doi = {10.1145/2379690.2379693}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Erbacher12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FangMK12, author = {Wenbin Fang and Barton P. Miller and James A. Kupsch}, editor = {Dino Schweitzer and Daniel Quist}, title = {Automated tracing and visualization of software security structure and properties}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {9--16}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379692}, doi = {10.1145/2379690.2379692}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/FangMK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FischerFVMT12, author = {Fabian Fischer and Johannes Fuchs and Pierre{-}Antoine Vervier and Florian Mansmann and Olivier Thonnard}, editor = {Dino Schweitzer and Daniel Quist}, title = {VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {80--87}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379701}, doi = {10.1145/2379690.2379701}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/FischerFVMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HarrisonSIDG12, author = {Lane Harrison and Riley Spahn and Michael D. Iannacone and Evan Downing and John R. Goodall}, editor = {Dino Schweitzer and Daniel Quist}, title = {{NV:} Nessus vulnerability visualization for the web}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {25--32}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379694}, doi = {10.1145/2379690.2379694}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/HarrisonSIDG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/InoueESSN12, author = {Daisuke Inoue and Masashi Eto and Koei Suzuki and Mio Suzuki and Koji Nakao}, editor = {Dino Schweitzer and Daniel Quist}, title = {{DAEDALUS-VIZ:} novel real-time 3D visualization for darknet monitoring-based alert system}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {72--79}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379700}, doi = {10.1145/2379690.2379700}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/InoueESSN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LeschkeS12, author = {Timothy R. Leschke and Alan T. Sherman}, editor = {Dino Schweitzer and Daniel Quist}, title = {Change-Link: a digital forensic tool for visualizing changes to directory trees}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {48--55}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379697}, doi = {10.1145/2379690.2379697}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LeschkeS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MansmannGC12, author = {Florian Mansmann and Timo G{\"{o}}bel and William R. Cheswick}, editor = {Dino Schweitzer and Daniel Quist}, title = {Visual analysis of complex firewall configurations}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {1--8}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379691}, doi = {10.1145/2379690.2379691}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/MansmannGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SaxeMG12, author = {Joshua Saxe and David Mentis and Christopher Greamo}, editor = {Dino Schweitzer and Daniel Quist}, title = {Visualization of shared system call sequence relationships in large malware corpora}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {33--40}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379695}, doi = {10.1145/2379690.2379695}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SaxeMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TsigkasTT12, author = {Orestis Tsigkas and Olivier Thonnard and Dimitrios Tzovaras}, editor = {Dino Schweitzer and Daniel Quist}, title = {Visual spam campaigns analysis using abstract graphs representation}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {64--71}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379699}, doi = {10.1145/2379690.2379699}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/TsigkasTT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/VerasTC12, author = {Rafael Veras and Julie Thorpe and Christopher Collins}, editor = {Dino Schweitzer and Daniel Quist}, title = {Visualizing semantics in passwords: the role of dates}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {88--95}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379702}, doi = {10.1145/2379690.2379702}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/VerasTC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ZhuoN12, author = {Wei Zhuo and Yacin Nadji}, editor = {Dino Schweitzer and Daniel Quist}, title = {MalwareVis: entity-based visualization of malware network traces}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {41--47}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379696}, doi = {10.1145/2379690.2379696}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ZhuoN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2012, editor = {Dino Schweitzer and Daniel Quist}, title = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690}, doi = {10.1145/2379690}, isbn = {978-1-4503-1413-8}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BoschettiSMM11, author = {Alberto Boschetti and Luca Salgarelli and Chris Muelder and Kwan{-}Liu Ma}, title = {TVi: a visual querying system for network monitoring and anomaly detection}, booktitle = {8th International Symposium on Visualization for Cyber Security, VizSec 2011, Pittsburgh, PA, USA, July 20, 2011}, pages = {1}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016904.2016905}, doi = {10.1145/2016904.2016905}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/BoschettiSMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HornD11, author = {Chris Horn and Anita D'Amico}, title = {Visual analysis of goal-directed network defense decisions}, booktitle = {8th International Symposium on Visualization for Cyber Security, VizSec 2011, Pittsburgh, PA, USA, July 20, 2011}, pages = {5}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016904.2016909}, doi = {10.1145/2016904.2016909}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/HornD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/KintzelFM11, author = {Christopher Kintzel and Johannes Fuchs and Florian Mansmann}, title = {Monitoring large {IP} spaces with ClockView}, booktitle = {8th International Symposium on Visualization for Cyber Security, VizSec 2011, Pittsburgh, PA, USA, July 20, 2011}, pages = {2}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016904.2016906}, doi = {10.1145/2016904.2016906}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/KintzelFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/NatarajKJM11, author = {Lakshmanan Nataraj and S. Karthikeyan and G. Jacob and B. S. Manjunath}, title = {Malware images: visualization and automatic classification}, booktitle = {8th International Symposium on Visualization for Cyber Security, VizSec 2011, Pittsburgh, PA, USA, July 20, 2011}, pages = {4}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016904.2016908}, doi = {10.1145/2016904.2016908}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/NatarajKJM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/RovetaCMZMC11, author = {Francesco Roveta and Giorgio Caviglia and Luca Di Mario and Stefano Zanero and Federico Maggi and Paolo Ciuccarelli}, title = {{BURN:} baring unknown rogue networks}, booktitle = {8th International Symposium on Visualization for Cyber Security, VizSec 2011, Pittsburgh, PA, USA, July 20, 2011}, pages = {6}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016904.2016910}, doi = {10.1145/2016904.2016910}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/RovetaCMZMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SinghBEKAN11, author = {Ankit Singh and Lauren Bradel and Alex Endert and Robert Kincaid and Christopher Andrews and Chris North}, title = {Supporting the cyber analytic process using visual history on large displays}, booktitle = {8th International Symposium on Visualization for Cyber Security, VizSec 2011, Pittsburgh, PA, USA, July 20, 2011}, pages = {3}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016904.2016907}, doi = {10.1145/2016904.2016907}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SinghBEKAN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2011, title = {8th International Symposium on Visualization for Cyber Security, VizSec 2011, Pittsburgh, PA, USA, July 20, 2011}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2016904}, doi = {10.1145/2016904}, isbn = {978-1-4503-0679-9}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BestBLWP10, author = {Daniel M. Best and Shawn Bohn and Douglas Love and Adam Wynne and William A. Pike}, editor = {John Gerth}, title = {Real-time visualization of network behaviors for situational awareness}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {79--90}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850805}, doi = {10.1145/1850795.1850805}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/BestBLWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ChuILWB10, author = {Matthew Chu and Kyle Ingols and Richard Lippmann and Seth E. Webster and Stephen W. Boyer}, editor = {John Gerth}, title = {Visualizing attack graphs, reachability, and trust relationships with {NAVIGATOR}}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {22--33}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850798}, doi = {10.1145/1850795.1850798}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ChuILWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Glatz10, author = {Eduard Glatz}, editor = {John Gerth}, title = {Visualizing host traffic through graphs}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {58--63}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850802}, doi = {10.1145/1850795.1850802}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Glatz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GoodallRH10, author = {John R. Goodall and Hassan Radwan and Lenny Halseth}, editor = {John Gerth}, title = {Visual analysis of code security}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {46--51}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850800}, doi = {10.1145/1850795.1850800}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/GoodallRH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GuentherVS10, author = {Jeffrey Guenther and Fred Volk and Mark Shaneck}, editor = {John Gerth}, title = {Proposing a multi-touch interface for intrusion detection environments}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {13--21}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850797}, doi = {10.1145/1850795.1850797}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/GuentherVS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HarrisonHYLWW10, author = {Lane Harrison and Xianlin Hu and Xiaowei Ying and Aidong Lu and Weichao Wang and Xintao Wu}, editor = {John Gerth}, title = {Interactive detection of network anomalies via coordinated multiple views}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {91--101}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850806}, doi = {10.1145/1850795.1850806}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/HarrisonHYLWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LianMM10, author = {Wilson Lian and Fabian Monrose and John McHugh}, editor = {John Gerth}, title = {Traffic classification using visual motifs: an empirical evaluation}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {70--78}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850804}, doi = {10.1145/1850795.1850804}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LianMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LiaoSC10, author = {Qi Liao and Aaron Striegel and Nitesh V. Chawla}, editor = {John Gerth}, title = {Visualizing graph dynamics and similarity for enterprise network security and management}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {34--45}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850799}, doi = {10.1145/1850795.1850799}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/LiaoSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/OehlerPK10, author = {Michael Oehler and Dhananjay S. Phatak and F. John Krautheim}, editor = {John Gerth}, title = {Visualizing your key for secure phone calls and language independence}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {64--69}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850803}, doi = {10.1145/1850795.1850803}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/OehlerPK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/RasmussenERKGP10, author = {Jamie C. Rasmussen and Kate Ehrlich and Steven I. Ross and Susanna E. Kirk and Daniel M. Gruen and John F. Patterson}, editor = {John Gerth}, title = {Nimble cybersecurity incident management through visualization and defensible recommendations}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {102--113}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850807}, doi = {10.1145/1850795.1850807}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/RasmussenERKGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WagnerWSDE10, author = {Cynthia Wagner and G{\'{e}}rard Wagener and Radu State and Alexandre Dulaunoy and Thomas Engel}, editor = {John Gerth}, title = {PeekKernelFlows: peeking into {IP} flows}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {52--57}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850801}, doi = {10.1145/1850795.1850801}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/WagnerWSDE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YuLRB10, author = {Tamara Yu and Richard Lippmann and James Riordan and Stephen W. Boyer}, editor = {John Gerth}, title = {{EMBER:} a global perspective on extreme malicious behavior}, booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, pages = {1--12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795.1850796}, doi = {10.1145/1850795.1850796}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/YuLRB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2010, editor = {John Gerth}, title = {7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1850795}, doi = {10.1145/1850795}, isbn = {978-1-4503-0013-1}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BarreraO09, author = {David Barrera and Paul C. van Oorschot}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Security visualization tools and IPv6 addresses}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {21--26}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375538}, doi = {10.1109/VIZSEC.2009.5375538}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/BarreraO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Cheswick09, author = {Bill Cheswick}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visual tools for security: Is there a there there?}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375533}, doi = {10.1109/VIZSEC.2009.5375533}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Cheswick09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FinkNER09, author = {Glenn A. Fink and Christopher L. North and Alex Endert and Stuart Rose}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualizing cyber security: Usable workspaces}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {45--56}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375542}, doi = {10.1109/VIZSEC.2009.5375542}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/FinkNER09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GlanfieldBTPSGM09, author = {Joel Glanfield and Stephen Brooks and Teryl Taylor and Diana Paterson and Christopher Smith and Carrie Gates and John McHugh}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Over flow: An overview visualization for network analysis}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {11--19}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375536}, doi = {10.1109/VIZSEC.2009.5375536}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/GlanfieldBTPSGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Goodall09, author = {John R. Goodall}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualization is better! {A} comparative evaluation}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {57--68}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375543}, doi = {10.1109/VIZSEC.2009.5375543}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Goodall09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Jankun-KellyWSFCS09, author = {T. J. Jankun{-}Kelly and David Wilson and Andrew S. Stamps and Josh Franck and Jeffrey C. Carver and J. Edward Swan II}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {A visual analytic framework for exploring relationships in textual contents of digital forensics evidence}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {39--44}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375541}, doi = {10.1109/VIZSEC.2009.5375541}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Jankun-KellyWSFCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MorrisseyG09, author = {Shaun P. Morrissey and Georges G. Grinstein}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualizing firewall configurations using created voids}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {75--79}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375546}, doi = {10.1109/VIZSEC.2009.5375546}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/MorrisseyG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/QuistL09, author = {Daniel Quist and Lorie M. Liebrock}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualizing compiled executables for malware analysis}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {27--32}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375539}, doi = {10.1109/VIZSEC.2009.5375539}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/QuistL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SchweitzerBHM09, author = {Dino Schweitzer and Jeff Boleng and Colin Hughes and Louis Murphy}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualizing keyboard pattern passwords}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {69--73}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375544}, doi = {10.1109/VIZSEC.2009.5375544}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/SchweitzerBHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TriniusHGF09, author = {Philipp Trinius and Thorsten Holz and Jan G{\"{o}}bel and Felix C. Freiling}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visual analysis of malware behavior using treemaps and thread graphs}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {33--38}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375540}, doi = {10.1109/VIZSEC.2009.5375540}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/TriniusHGF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YelizarovG09, author = {Anatoly Yelizarov and Dennis Gamayunov}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualization of complex attacks and state of attacked network}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375527}, doi = {10.1109/VIZSEC.2009.5375527}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/YelizarovG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2009, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5368324/proceeding}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BlueDFKS08, author = {Ryan Blue and Cody Dunne and Adam Fuchs and Kyle King and Aaron Schulman}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Visualizing Real-Time Network Resource Usage}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {119--135}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_12}, doi = {10.1007/978-3-540-85933-8\_12}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/BlueDFKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BratusHPS08, author = {Sergey Bratus and Axel Hansen and Fabio Pellacini and Anna Shubina}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Backhoe, a Packet Trace and Log Browser}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {152--160}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_15}, doi = {10.1007/978-3-540-85933-8\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/BratusHPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ContiDSS08, author = {Gregory J. Conti and Erik Dean and Matthew Sinda and Benjamin Sangster}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Visual Reverse Engineering of Binary and Data Files}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {1--17}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_1}, doi = {10.1007/978-3-540-85933-8\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/ContiDSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FischerMKPW08, author = {Fabian Fischer and Florian Mansmann and Daniel A. Keim and Stephan Pietzko and Marcel Waldvogel}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Large-Scale Network Monitoring for Visual Analysis of Attacks}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {111--118}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_11}, doi = {10.1007/978-3-540-85933-8\_11}, timestamp = {Wed, 10 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/FischerMKPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HeitzmannPPT08, author = {Alexander Heitzmann and Bernardo Palazzi and Charalampos Papamanthou and Roberto Tamassia}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Effective Visualization of File System Access-Control}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {18--25}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_2}, doi = {10.1007/978-3-540-85933-8\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/HeitzmannPPT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HomerVOM08, author = {John Homer and Ashok Varikuti and Xinming Ou and Miles A. McQueen}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Improving Attack Graph Visualization through Data Reduction and Attack Grouping}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {68--79}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_7}, doi = {10.1007/978-3-540-85933-8\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/HomerVOM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Janies08, author = {Jeff Janies}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Existence Plots: {A} Low-Resolution Time Series for Port Behavior Analysis}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {161--168}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_16}, doi = {10.1007/978-3-540-85933-8\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Janies08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Jankun-KellyFWCDS08, author = {T. J. Jankun{-}Kelly and Josh Franck and David Wilson and Jeffrey C. Carver and David A. Dampier and J. Edward Swan II}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {80--86}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_8}, doi = {10.1007/978-3-540-85933-8\_8}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Jankun-KellyFWCDS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MinarikD08, author = {Pavel Minar{\'{\i}}k and Tom{\'{a}}s Dym{\'{a}}cek}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {NetFlow Data Visualization Based on Graphs}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {144--151}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_14}, doi = {10.1007/978-3-540-85933-8\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/MinarikD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MusaP08, author = {Shahrulniza Musa and David J. Parish}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {169--180}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_17}, doi = {10.1007/978-3-540-85933-8\_17}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/MusaP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/OHareNP08, author = {Scott O'Hare and Steven Noel and Kenneth Prole}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {A Graph-Theoretic Visualization Approach to Network Risk Analysis}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {60--67}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_6}, doi = {10.1007/978-3-540-85933-8\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/OHareNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ProleGDK08, author = {Kenneth Prole and John R. Goodall and Anita D. D'Amico and Jason K. Kopylec}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Wireless Cyber Assets Discovery Visualization}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {136--143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_13}, doi = {10.1007/978-3-540-85933-8\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/ProleGDK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SchwartzL08, author = {Moses Schwartz and Lorie M. Liebrock}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {A Term Distribution Visualization Approach to Digital Forensic String Search}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {36--43}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_4}, doi = {10.1007/978-3-540-85933-8\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/SchwartzL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ShearerMK08, author = {James Shearer and Kwan{-}Liu Ma and Toby Kohlenberg}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {BGPeep: An IP-Space Centered View for Internet Routing Data}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {95--110}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_10}, doi = {10.1007/978-3-540-85933-8\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/ShearerMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SuoZO08, author = {Xiaoyuan Suo and Ying Zhu and G. Scott Owen}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {A Task Centered Framework for Computer Security Data Visualization}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {87--94}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_9}, doi = {10.1007/978-3-540-85933-8\_9}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/SuoZO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Vandenberghe08, author = {Grant Vandenberghe}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Network Traffic Exploration Application: {A} Tool to Assess, Visualize, and Analyze Network Security Events}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {181--196}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_18}, doi = {10.1007/978-3-540-85933-8\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Vandenberghe08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WilliamsLI08, author = {Leevar Williams and Richard Lippmann and Kyle Ingols}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {{GARNET:} {A} Graphical Attack Graph and Reachability Network Evaluation Tool}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {44--59}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_5}, doi = {10.1007/978-3-540-85933-8\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/WilliamsLI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/XiaFO08, author = {Ying H. Xia and Kevin D. Fairbanks and Henry L. Owen}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Visual Analysis of Program Flow Data with Data Propagation}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {26--35}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_3}, doi = {10.1007/978-3-540-85933-8\_3}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/XiaFO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2007, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78243-8}, doi = {10.1007/978-3-540-78243-8}, isbn = {978-3-540-78242-1}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2008, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8}, doi = {10.1007/978-3-540-85933-8}, isbn = {978-3-540-85931-4}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/DAmicoW07, author = {Anita D. D'Amico and K. Whitley}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {The Real Work of Computer Network Defense Analysts}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {19--37}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_2}, doi = {10.1007/978-3-540-78243-8\_2}, timestamp = {Wed, 08 Feb 2023 10:32:17 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/DAmicoW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ForestiA07, author = {Stefano Foresti and James Agutter}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {VisAlert: From Idea to Product}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {159--174}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_11}, doi = {10.1007/978-3-540-78243-8\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/ForestiA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Goodall07, author = {John R. Goodall}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Introduction to Visualization for Computer Security}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {1--17}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_1}, doi = {10.1007/978-3-540-78243-8\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Goodall07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/IrwinP07, author = {Barry Irwin and Nick Pilkington}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {147--158}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_10}, doi = {10.1007/978-3-540-78243-8\_10}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/IrwinP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/IrwinR07, author = {Barry Irwin and Jean{-}Pierre van Riel}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {255--273}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_17}, doi = {10.1007/978-3-540-78243-8\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/IrwinR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LalanneBHB07, author = {Denis Lalanne and Enrico Bertini and Patrick Hertzog and P. Bados}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {115--130}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_8}, doi = {10.1007/978-3-540-78243-8\_8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LalanneBHB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MansmanMK07, author = {Florian Mansmann and L. Meier and Daniel A. Keim}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Visualization of Host Behavior for Network Security}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {187--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_13}, doi = {10.1007/978-3-540-78243-8\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/MansmanMK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MuelderCTMB07, author = {Chris Muelder and Lei Chen and Russell Thomason and Kwan{-}Liu Ma and Tony Bartoletti}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Intelligent Classification and Visualization of Network Scans}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {237--253}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_16}, doi = {10.1007/978-3-540-78243-8\_16}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/MuelderCTMB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/PearlmanR07, author = {Jason Pearlman and Penny Rheingans}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {131--146}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_9}, doi = {10.1007/978-3-540-78243-8\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/PearlmanR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/PhanGLPW07, author = {Doantam Phan and John Gerth and M. Lee and Andreas Paepcke and Terry Winograd}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Visual Analysis of Network Flow Data with Timelines and Event Plots}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {85--99}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_6}, doi = {10.1007/978-3-540-78243-8\_6}, timestamp = {Sun, 08 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/PhanGLPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/PikeSZ07, author = {William A. Pike and Chad Scherrer and S. Zabriskie}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Putting Security in Context: Visual Correlation of Network Activity with Real-World Information}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {203--220}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_14}, doi = {10.1007/978-3-540-78243-8\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/PikeSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SchweitzerBB07, author = {Dino Schweitzer and Leemon C. Baird III and William L. Bahn}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Visually Understanding Jam Resistant Communication}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {175--186}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_12}, doi = {10.1007/978-3-540-78243-8\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/SchweitzerBB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/StollMGCE07, author = {Jennifer Stoll and Dave McColgin and Michelle Gregory and Vern Crow and W. Keith Edwards}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Adapting Personas for Use in Security Visualization Design}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {39--52}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_3}, doi = {10.1007/978-3-540-78243-8\_3}, timestamp = {Thu, 20 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/StollMGCE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SuoZO07, author = {Xiaoyuan Suo and Ying Zhu and G. Scott Owen}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Measuring the Complexity of Computer Security Visualization Designs}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {53--66}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_4}, doi = {10.1007/978-3-540-78243-8\_4}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/SuoZO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TaylorBM07, author = {Teryl Taylor and Stephen Brooks and John McHugh}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {101--114}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_7}, doi = {10.1007/978-3-540-78243-8\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/TaylorBM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WilliamsLI07, author = {Leevar Williams and Richard Lippmann and Kyle Ingols}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {An Interactive Attack Graph Cascade and Reachability Display}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {221--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_15}, doi = {10.1007/978-3-540-78243-8\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/WilliamsLI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YuFBRC07, author = {T. H. Yu and Benjamin W. Fuller and J. H. Bannick and Lee M. Rossey and Robert K. Cunningham}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Integrated Environment Management for Information Operations Testbeds}, booktitle = {4th International Workshop on Visualization for Computer Security, VizSEC 2007, Sacramento, CA, USA, October 29, 2007}, series = {Mathematics and Visualization}, pages = {67--83}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78243-8\_5}, doi = {10.1007/978-3-540-78243-8\_5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/YuFBRC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AbdullahC06, author = {Kulsoom Abdullah and John A. Copeland}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Tool update: high alarm count issues in {IDS} rainstorm}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {61--62}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179587}, doi = {10.1145/1179576.1179587}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AbdullahC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HarropA06, author = {Warren Harrop and Grenville J. Armitage}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Real-time collaborative network monitoring and control using 3D game engines for representation and interaction}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {31--40}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179583}, doi = {10.1145/1179576.1179583}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/HarropA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Hertzog06, author = {Patrick Hertzog}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Visualizations to improve reactivity towards security incidents inside corporate networks}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {95--102}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179596}, doi = {10.1145/1179576.1179596}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Hertzog06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LeeC06, author = {Christopher P. Lee and John A. Copeland}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {103--108}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179597}, doi = {10.1145/1179576.1179597}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LeeC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LiLK06, author = {Lunquan Li and Peng Liu and George Kesidis}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Visual toolkit for network security experiment specification and data analysis}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {7--14}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179579}, doi = {10.1145/1179576.1179579}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LiLK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MalecotKHS06, author = {Erwan Le Mal{\'{e}}cot and Masayoshi Kohara and Yoshiaki Hori and Kouichi Sakurai}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Interactively combining 2D and 3D visualization for network traffic monitoring}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {123--127}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179600}, doi = {10.1145/1179576.1179600}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/MalecotKHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MathewGUSS06, author = {Sunu Mathew and Richard Giomundo and Shambhu J. Upadhyaya and Moises Sudit and Adam Stotz}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Understanding multistage attacks by attack-track based visualization of heterogeneous event streams}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {1--6}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179578}, doi = {10.1145/1179576.1179578}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/MathewGUSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/OberheideKB06, author = {Jon Oberheide and Manish Karir and Dionysus Blazakis}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {{VAST:} visualizing autonomous system topology}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {71--80}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179592}, doi = {10.1145/1179576.1179592}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/OberheideKB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Ren06, author = {Pin Ren}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Ensuring the continuing success of vizsec}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {67--70}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179591}, doi = {10.1145/1179576.1179591}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Ren06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/RenKG06, author = {Pin Ren and John Kristoff and Bruce Gooch}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Visualizing {DNS} traffic}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {23--30}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179582}, doi = {10.1145/1179576.1179582}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/RenKG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SchweitzerB06, author = {Dino Schweitzer and Leemon C. Baird III}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Discovering an {RC4} anomaly through visualization}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {91--94}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179595}, doi = {10.1145/1179576.1179595}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/SchweitzerB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ShabtaiKSE06, author = {Asaf Shabtai and Denis Klimov and Yuval Shahar and Yuval Elovici}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {An intelligent, interactive tool for exploration and visualization of time-oriented security data}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {15--22}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179580}, doi = {10.1145/1179576.1179580}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/ShabtaiKSE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/StephanoG06, author = {Amanda L. Stephano and Dennis P. Groth}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {USEable security: interface design strategies for improving security}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {109--116}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179598}, doi = {10.1145/1179576.1179598}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/StephanoG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TeohRNC06, author = {Soon Tee Teoh and Supranamaya Ranjan and Antonio Nucci and Chen{-}Nee Chuah}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {{BGP} eye: a new visualization tool for real-time detection and analysis of {BGP} anomalies}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {81--90}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179593}, doi = {10.1145/1179576.1179593}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/TeohRNC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WangL06, author = {Weichao Wang and Aidong Lu}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Visualization assisted detection of sybil attacks in wireless networks}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {51--60}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179585}, doi = {10.1145/1179576.1179585}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/WangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WrightMM06, author = {Charles V. Wright and Fabian Monrose and Gerald M. Masson}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Using visual motifs to classify encrypted traffic}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {41--50}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179584}, doi = {10.1145/1179576.1179584}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/WrightMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Yee06, author = {George Yee}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Visualization for privacy compliance}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {117--122}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179599}, doi = {10.1145/1179576.1179599}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Yee06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Yurcik06, author = {William Yurcik}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Tool update: \emph{visflowconnect-IP} with advanced filtering from usability testing}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {63--64}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179588}, doi = {10.1145/1179576.1179588}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Yurcik06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Yurcik06a, author = {William Yurcik}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Tool update: \emph{NVisionIP} improvements (difference view, sparklines, and shapes)}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {65--66}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179589}, doi = {10.1145/1179576.1179589}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Yurcik06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2006, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576}, doi = {10.1145/1179576}, isbn = {1-59593-549-5}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/AbdullahLCCS05, author = {Kulsoom Abdullah and Christopher P. Lee and Gregory J. Conti and John A. Copeland and John T. Stasko}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {{IDS} RainStorm: Visualizing {IDS} Alarms}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.8}, doi = {10.1109/VIZSEC.2005.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/AbdullahLCCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ContiGAO05, author = {Gregory J. Conti and Julian B. Grizzard and Mustaque Ahamad and Henry L. Owen}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {10}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.19}, doi = {10.1109/VIZSEC.2005.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ContiGAO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/DAmicoK05, author = {Anita D'Amico and Michael Kocka}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {13}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.13}, doi = {10.1109/VIZSEC.2005.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/DAmicoK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ErbacherCS05, author = {Robert F. Erbacher and Kim Christensen and Amanda Sundberg}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Designing Visualization Capabilities for {IDS} Challenges}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {15}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.5}, doi = {10.1109/VIZSEC.2005.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ErbacherCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FinkMN05, author = {Glenn A. Fink and Paul Muessig and Chris North}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Visual Correlation of Host Processes and Network Traffic}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {2}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.18}, doi = {10.1109/VIZSEC.2005.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/FinkMN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FinkN05, author = {Glenn A. Fink and Chris North}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Root Polar Layout of Internet Address Data for Security Administration}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {7}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.23}, doi = {10.1109/VIZSEC.2005.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/FinkN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GoodallLRK05, author = {John R. Goodall and Wayne G. Lutters and Penny Rheingans and Anita Komlodi}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Preserving the Big Picture: Visual Network Traffic Analysis with {TN}}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {6}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.17}, doi = {10.1109/VIZSEC.2005.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/GoodallLRK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/KoikeOK05, author = {Hideki Koike and Kazuhiro Ohno and Kanba Koizumi}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Visualizing Cyber Attacks using {IP} Matrix}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {11}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.22}, doi = {10.1109/VIZSEC.2005.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/KoikeOK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/KomlodiRAGJ05, author = {Anita Komlodi and Penny Rheingans and Utkarsha Ayachit and John R. Goodall and Amit Joshi}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {A User-centered Look at Glyph-based Security Visualization}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {3}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.1}, doi = {10.1109/VIZSEC.2005.1}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/KomlodiRAGJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LakkarajuBSYN05, author = {Kiran Lakkaraju and Ratna Bearavolu and Adam J. Slagell and William Yurcik and Stephen C. North}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {9}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.3}, doi = {10.1109/VIZSEC.2005.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LakkarajuBSYN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LeeTGBC05, author = {Christopher P. Lee and Jason Trost and Nicholas Gibbs and Raheem A. Beyah and John A. Copeland}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Visual Firewall: Real-time Network Security Monito}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {16}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.20}, doi = {10.1109/VIZSEC.2005.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LeeTGBC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MuelderMB05, author = {Chris Muelder and Kwan{-}Liu Ma and Tony Bartoletti}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {A Visualization Methodology for Characterization of Network Scans}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {4}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.2}, doi = {10.1109/VIZSEC.2005.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/MuelderMB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/NoelJKJ05, author = {Steven Noel and Michael Jacobs and Pramod Kalapa and Sushil Jajodia}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Multiple Coordinated Views for Network Attack Graphs}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {12}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.14}, doi = {10.1109/VIZSEC.2005.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/NoelJKJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/OlineR05, author = {Adam Oline and Dirk Reiners}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Exploring Three-dimensional Visualization for Intrusion Detection}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {14}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.6}, doi = {10.1109/VIZSEC.2005.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/OlineR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/RenGLCW05, author = {Pin Ren and Yan Gao and Zhichun Li and Yan Chen and Benjamin Watson}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {IDGraphs: Intrusion Detection and Analysis Using Histographs}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {5}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.7}, doi = {10.1109/VIZSEC.2005.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/RenGLCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/X05, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Title Page}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.12}, doi = {10.1109/VIZSEC.2005.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/X05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/X05a, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Copyright}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.9}, doi = {10.1109/VIZSEC.2005.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/X05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/X05b, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Preface}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.16}, doi = {10.1109/VIZSEC.2005.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/X05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/X05c, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Committees}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.4}, doi = {10.1109/VIZSEC.2005.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/X05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YaoSTW05, author = {Danfeng Yao and Michael Shin and Roberto Tamassia and William H. Winsborough}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Visualization of Automated Trust Negotiation}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {8}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.21}, doi = {10.1109/VIZSEC.2005.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/YaoSTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2005, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/10259/proceeding}, isbn = {0-7803-9477-1}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Axelsson04, author = {Stefan Axelsson}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Combining a bayesian classifier with visualisation: understanding the {IDS}}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {99--108}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029224}, doi = {10.1145/1029208.1029224}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Axelsson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/BallFN04, author = {Robert Ball and Glenn A. Fink and Chris North}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Home-centric visualization of network traffic for security administration}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {55--64}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029217}, doi = {10.1145/1029208.1029217}, timestamp = {Wed, 04 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/BallFN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ColombeS04, author = {Jeffrey B. Colombe and Greg Stephens}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Statistical profiling and visualization for detection of malicious insider attacks on computer networks}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {138--142}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029231}, doi = {10.1145/1029208.1029231}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/ColombeS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ContiA04, author = {Gregory J. Conti and Kulsoom Abdullah}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Passive visual fingerprinting of network attack tools}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {45--54}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029216}, doi = {10.1145/1029208.1029216}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ContiA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Goldring04, author = {Thomas Goldring}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Scatter (and other) plots for visualizing user profiling data and network traffic}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {119--123}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029227}, doi = {10.1145/1029208.1029227}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Goldring04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/KoikeO04, author = {Hideki Koike and Kazuhiro Ohno}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {SnortView: visualization system of snort logs}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {143--147}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029232}, doi = {10.1145/1029208.1029232}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/KoikeO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LakkarajuYL04, author = {Kiran Lakkaraju and William Yurcik and Adam J. Lee}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {NVisionIP: netflow visualizations of system state for security situational awareness}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {65--72}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029219}, doi = {10.1145/1029208.1029219}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/LakkarajuYL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LiHS04, author = {Wei{-}Jen Li and Shlomo Hershkop and Salvatore J. Stolfo}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Email archive analysis through graphical visualization}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {128--132}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029229}, doi = {10.1145/1029208.1029229}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LiHS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/McPhersonMKBC04, author = {Jonathan McPherson and Kwan{-}Liu Ma and Paul Krystosk and Tony Bartoletti and Marvin Christensen}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {PortVis: a tool for port-based detection of security events}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {73--81}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029220}, doi = {10.1145/1029208.1029220}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/McPhersonMKBC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/NoelJ04, author = {Steven Noel and Sushil Jajodia}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Managing attack graph complexity through visual hierarchical aggregation}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {109--118}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029225}, doi = {10.1145/1029208.1029225}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/NoelJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/PapadopoulosKSH04, author = {Christos Papadopoulos and Chris Kyriakakis and Alexander A. Sawchuk and Xinming He}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {CyberSeer: 3D audio-visual immersion for network security and management}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {90--98}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029223}, doi = {10.1145/1029208.1029223}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/PapadopoulosKSH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/PusaraB04, author = {Maja Pusara and Carla E. Brodley}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {User re-authentication via mouse movements}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {1--8}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029210}, doi = {10.1145/1029208.1029210}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/PusaraB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TandonCM04, author = {Gaurav Tandon and Philip K. Chan and Debasis Mitra}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {{MORPHEUS:} motif oriented representations to purge hostile events from unlabeled sequences}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {16--25}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029212}, doi = {10.1145/1029208.1029212}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/TandonCM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TeohZTMW04, author = {Soon Tee Teoh and Ke Zhang and Shih{-}Ming Tseng and Kwan{-}Liu Ma and Shyhtsun Felix Wu}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Combining visual and automated data mining for near-real-time anomaly detection and analysis in {BGP}}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {35--44}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029215}, doi = {10.1145/1029208.1029215}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/TeohZTMW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ValdesF04, author = {Alfonso Valdes and Martin W. Fong}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Scalable visualization of propagating internet phenomena}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {124--127}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029228}, doi = {10.1145/1029208.1029228}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ValdesF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WrightMM04, author = {Charles V. Wright and Fabian Monrose and Gerald M. Masson}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {{HMM} profiles for network traffic classification}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {9--15}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029211}, doi = {10.1145/1029208.1029211}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/WrightMM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YinYTLL04, author = {Xiaoxin Yin and William Yurcik and Michael Treaster and Yifan Li and Kiran Lakkaraju}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {VisFlowConnect: netflow visualizations of link relationships for security situational awareness}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {26--34}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029214}, doi = {10.1145/1029208.1029214}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/YinYTLL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Yoo04, author = {InSeon Yoo}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Visualizing windows executable viruses using self-organizing maps}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {82--89}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029222}, doi = {10.1145/1029208.1029222}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Yoo04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YurcikMK04, author = {William Yurcik and Xin Meng and Nadir Kiyanclar}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {NVisionCC: a visualization framework for high performance cluster security}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {133--137}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029230}, doi = {10.1145/1029208.1029230}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/YurcikMK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2004, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208}, doi = {10.1145/1029208}, isbn = {1-58113-974-8}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.