Conferences in DBLP
(vizsec) 2004 (conf/vizsec/2004)
Maja Pusara , Carla E. Brodley User re-authentication via mouse movements. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:1-8 [Conf ] Charles Wright , Fabian Monrose , Gerald M. Masson HMM profiles for network traffic classification. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:9-15 [Conf ] Gaurav Tandon , Philip Chan , Debasis Mitra MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:16-25 [Conf ] Xiaoxin Yin , William Yurcik , Michael Treaster , Yifan Li , Kiran Lakkaraju VisFlowConnect: netflow visualizations of link relationships for security situational awareness. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:26-34 [Conf ] Soon Tee Teoh , Ke Zhang , Shih-Ming Tseng , Kwan-Liu Ma , Shyhtsun Felix Wu Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:35-44 [Conf ] Gregory J. Conti , Kulsoom Abdullah Passive visual fingerprinting of network attack tools. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:45-54 [Conf ] Robert Ball , Glenn A. Fink , Chris North Home-centric visualization of network traffic for security administration. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:55-64 [Conf ] Kiran Lakkaraju , William Yurcik , Adam J. Lee NVisionIP: netflow visualizations of system state for security situational awareness. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:65-72 [Conf ] Jonathan McPherson , Kwan-Liu Ma , Paul Krystosk , Tony Bartoletti , Marvin Christensen PortVis: a tool for port-based detection of security events. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:73-81 [Conf ] InSeon Yoo Visualizing windows executable viruses using self-organizing maps. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:82-89 [Conf ] Christos Papadopoulos , Chris Kyriakakis , Alexander A. Sawchuk , Xinming He CyberSeer: 3D audio-visual immersion for network security and management. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:90-98 [Conf ] Stefan Axelsson Combining a bayesian classifier with visualisation: understanding the IDS. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:99-108 [Conf ] Steven Noel , Sushil Jajodia Managing attack graph complexity through visual hierarchical aggregation. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:109-118 [Conf ] Thomas Goldring Scatter (and other) plots for visualizing user profiling data and network traffic. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:119-123 [Conf ] Alfonso Valdes , Martin W. Fong Scalable visualization of propagating internet phenomena. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:124-127 [Conf ] Wei-Jen Li , Shlomo Hershkop , Salvatore J. Stolfo Email archive analysis through graphical visualization. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:128-132 [Conf ] William Yurcik , Xin Meng , Nadir Kiyanclar NVisionCC: a visualization framework for high performance cluster security. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:133-137 [Conf ] Jeffrey B. Colombe , Gregory Stephens Statistical profiling and visualization for detection of malicious insider attacks on computer networks. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:138-142 [Conf ] Hideki Koike , Kazuhiro Ohno SnortView: visualization system of snort logs. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:143-147 [Conf ]