|
Conferences in DBLP
(vizsec) 2008 (conf/vizsec/2008)
Visual Reverse Engineering of Binary and Data Files. [Citation Graph (, )][DBLP]
Effective Visualization of File System Access-Control. [Citation Graph (, )][DBLP]
Visual Analysis of Program Flow Data with Data Propagation. [Citation Graph (, )][DBLP]
A Term Distribution Visualization Approach to Digital Forensic String Search. [Citation Graph (, )][DBLP]
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. [Citation Graph (, )][DBLP]
A Graph-Theoretic Visualization Approach to Network Risk Analysis. [Citation Graph (, )][DBLP]
Improving Attack Graph Visualization through Data Reduction and Attack Grouping. [Citation Graph (, )][DBLP]
Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization. [Citation Graph (, )][DBLP]
A Task Centered Framework for Computer Security Data Visualization. [Citation Graph (, )][DBLP]
BGPeep: An IP-Space Centered View for Internet Routing Data. [Citation Graph (, )][DBLP]
Large-Scale Network Monitoring for Visual Analysis of Attacks. [Citation Graph (, )][DBLP]
Visualizing Real-Time Network Resource Usage. [Citation Graph (, )][DBLP]
Wireless Cyber Assets Discovery Visualization. [Citation Graph (, )][DBLP]
NetFlow Data Visualization Based on Graphs. [Citation Graph (, )][DBLP]
Backhoe, a Packet Trace and Log Browser. [Citation Graph (, )][DBLP]
Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis. [Citation Graph (, )][DBLP]
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. [Citation Graph (, )][DBLP]
Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. [Citation Graph (, )][DBLP]
|