Tool update, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.129-136, 2005. ,
DOI : 10.1145/1179576.1179587
Statistical profiling and visualization for detection of malicious insider attacks on computer networks, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.138-142, 2004. ,
DOI : 10.1145/1029208.1029231
Real-Time Visualization of Network Behaviors for Situational Awareness Visualizing distributed memory computations with hive plots VisAlert : From Idea to Product, Proc. of VizSEC'10 Proc. of VizSEC '12 Proc. of VizSEC'07, pp.79-90, 2007. ,
Bridging the Host-Network Divide : Survey, Taxonomy, and Solution, Proc. of LISA '06 : 20th Large Installation System Administration Conference, pp.247-262, 2006. ,
Visual Correlation of Host Processes and Network Traffic, Proc. of VizSEC'05, pp.11-19, 2005. ,
OverFlow : An Overview Visualization for Network Analysis ,
DOI : 10.1109/vizsec.2009.5375536
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.4589
Preserving the big picture: visual network traffic analysis with TNV, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)., pp.47-54, 2005. ,
DOI : 10.1109/VIZSEC.2005.1532065
Visualizations to Improve Reactivity Towards Security Incidents Inside Corporate Networks Hive Plots -Linear Layout for Network Visualization -Visually Interpreting Network Structure and Content Made Possible, Proc. of VizSEC'06, pp.95-101, 2006. ,
Interactive detection of network anomalies via coordinated multiple views, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.91-101, 2010. ,
DOI : 10.1145/1850795.1850806
Using InetVis to Evaluate Snort and Bro Scan ,
DOI : 10.1007/978-3-540-78243-8_17
A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques, 2006. ,
Monitoring large IP spaces with ClockView, Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec '11, pp.1-210, 2011. ,
DOI : 10.1145/2016904.2016906
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.227.7079
SnortView, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04 ,
DOI : 10.1145/1029208.1029232
Visualizing Cyber Attacks using IP Matrix, Proc. of Viz- SEC'05, pp.91-98, 2005. ,
DOI : 10.1109/vizsec.2005.22
NVisionIP, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.65-72, 2004. ,
DOI : 10.1145/1029208.1029219
A visualization paradigm for network intrusion detection, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005., pp.92-99, 2005. ,
DOI : 10.1109/IAW.2005.1495939
Visual correlation for situational awareness, IEEE Symposium on Information Visualization (INFOVIS'05), pp.95-102, 2005. ,
DOI : 10.1109/infovis.2005.36
Visual Firewall : Real-time Network Security Monitor Workshop on Visualization for Computer Security, Proc. of VizSEC'05, pp.129-136, 2005. ,
Flowtag, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.103-108, 2006. ,
DOI : 10.1145/1179576.1179597
Traffic classification using visual motifs, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, 2010. ,
DOI : 10.1145/1850795.1850804
Closing-the-Loop in NVisionIP : Integrating Discovery and Search in Security Visualizations ,
PortVis, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.73-81, 2004. ,
DOI : 10.1145/1029208.1029220
A Visualization Methodology for Characterization of Network Scans Workshop on Visualization for Computer Security, Proc. of VizSEC'05, pp.29-38, 2005. ,
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective ,
DOI : 10.1007/978-3-540-78243-8_9
BGP Eye : A New Visualization Tool for Real-time Detection and Analysis of BGP Anomalies, pp.81-90, 2003. ,
BURN, Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec '11, pp.1-610, 2011. ,
DOI : 10.1145/2016904.2016910
Nimble cybersecurity incident management through visualization and defensible recommendations, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.102-113, 2010. ,
DOI : 10.1145/1850795.1850807
A Survey of Visualization Systems for Network Security, IEEE Transactions on Visualization and Computer Graphics, vol.18, issue.8, pp.1313-1329, 2012. ,
DOI : 10.1109/TVCG.2011.144
An Interactive Attack Graph Cascade and Reachability Display, Proc. of VizSEC'07, pp.221-236, 2007. ,
DOI : 10.1007/978-3-540-78243-8_15
Using visual motifs to classify encrypted traffic, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.41-50, 2003. ,
DOI : 10.1145/1179576.1179584
VisFlowConnect, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.26-34, 2004. ,
DOI : 10.1145/1029208.1029214
Integrated Environment Management for Information Operations Testbeds, pp.67-83 ,
DOI : 10.1007/978-3-540-78243-8_5
Integrated Environment Management for Information Operations Testbeds LARIAT Provides High-Fidelity Network Emulation and User Simulation, pp.1-25, 2007. ,
Visualization of complex attacks and state of attacked network, 2009 6th International Workshop on Visualization for Cyber Security, pp.1-9, 2009. ,
DOI : 10.1109/VIZSEC.2009.5375527
EMBER, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, 2010. ,
DOI : 10.1145/1850795.1850796
Tool update, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.65-66, 2006. ,
DOI : 10.1145/1179576.1179589