Conferences in DBLP
(vizsec) 2005 (conf/vizsec/2005)
Preface. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:- [Conf ] Title Page. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:- [Conf ] Committees. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:- [Conf ] Copyright. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:- [Conf ] Kulsoom Abdullah , Christopher P. Lee , Gregory J. Conti , John A. Copeland , John T. Stasko IDS RainStorm: Visualizing IDS Alarms. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:1- [Conf ] Glenn A. Fink , Paul Muessig , Chris North Visual Correlation of Host Processes and Network Traffic. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:2- [Conf ] Anita Komlodi , Penny Rheingans , Utkarsha Ayachit , John R. Goodall , Amit Joshi A User-centered Look at Glyph-based Security Visualization. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:3- [Conf ] Chris Muelder , Kwan-Liu Ma , Tony Bartoletti A Visualization Methodology for Characterization of Network Scans. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:4- [Conf ] Pin Ren , Yan Gao , Zhichun Li , Yan Chen , Benjamin Watson IDGraphs: Intrusion Detection and Analysis Using Histographs. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:5- [Conf ] John R. Goodall , Wayne G. Lutters , Penny Rheingans , Anita Komlodi Preserving the Big Picture: Visual Network Traffic Analysis with TN. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:6- [Conf ] Glenn A. Fink , Chris North Root Polar Layout of Internet Address Data for Security Administration. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:7- [Conf ] Danfeng Yao , Michael Shin , Roberto Tamassia , William H. Winsborough Visualization of Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:8- [Conf ] Kiran Lakkaraju , Ratna Bearavolu , Adam J. Slagell , William Yurcik , Stephen C. North Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:9- [Conf ] Gregory J. Conti , Julian B. Grizzard , Mustaque Ahamad , Henry L. Owen Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:10- [Conf ] Hideki Koike , Kazuhiro Ohno , Kanba Koizumi Visualizing Cyber Attacks using IP Matrix. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:11- [Conf ] Steven Noel , Michael Jacobs , Pramod Kalapa , Sushil Jajodia Multiple Coordinated Views for Network Attack Graphs. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:12- [Conf ] Anita D'Amico , Michael Kocka Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:13- [Conf ] Adam Oline , Dirk Reiners Exploring Three-dimensional Visualization for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:14- [Conf ] Robert F. Erbacher , Kim Christensen , Amanda Sundberg Designing Visualization Capabilities for IDS Challenges. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:15- [Conf ] Christopher P. Lee , Jason Trost , Nicholas Gibbs , Raheem Beyah , John A. Copeland Visual Firewall: Real-time Network Security Monito. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:16- [Conf ]