The SCEAS System
Navigation Menu

Conferences in DBLP

(vizsec)
2005 (conf/vizsec/2005)


  1. Preface. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:- [Conf]

  2. Title Page. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:- [Conf]

  3. Committees. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:- [Conf]

  4. Copyright. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:- [Conf]
  5. Kulsoom Abdullah, Christopher P. Lee, Gregory J. Conti, John A. Copeland, John T. Stasko
    IDS RainStorm: Visualizing IDS Alarms. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:1- [Conf]
  6. Glenn A. Fink, Paul Muessig, Chris North
    Visual Correlation of Host Processes and Network Traffic. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:2- [Conf]
  7. Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi
    A User-centered Look at Glyph-based Security Visualization. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:3- [Conf]
  8. Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
    A Visualization Methodology for Characterization of Network Scans. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:4- [Conf]
  9. Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson
    IDGraphs: Intrusion Detection and Analysis Using Histographs. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:5- [Conf]
  10. John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi
    Preserving the Big Picture: Visual Network Traffic Analysis with TN. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:6- [Conf]
  11. Glenn A. Fink, Chris North
    Root Polar Layout of Internet Address Data for Security Administration. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:7- [Conf]
  12. Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough
    Visualization of Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:8- [Conf]
  13. Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North
    Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:9- [Conf]
  14. Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen
    Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:10- [Conf]
  15. Hideki Koike, Kazuhiro Ohno, Kanba Koizumi
    Visualizing Cyber Attacks using IP Matrix. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:11- [Conf]
  16. Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia
    Multiple Coordinated Views for Network Attack Graphs. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:12- [Conf]
  17. Anita D'Amico, Michael Kocka
    Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:13- [Conf]
  18. Adam Oline, Dirk Reiners
    Exploring Three-dimensional Visualization for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:14- [Conf]
  19. Robert F. Erbacher, Kim Christensen, Amanda Sundberg
    Designing Visualization Capabilities for IDS Challenges. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:15- [Conf]
  20. Christopher P. Lee, Jason Trost, Nicholas Gibbs, Raheem Beyah, John A. Copeland
    Visual Firewall: Real-time Network Security Monito. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:16- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002