Visualizing Privacy Implications of Access Control Policies in Social Network Systems, Proc. of the 4th International Workshop on Data Privacy Management (DPM'09), pp.106-120, 2010. ,
DOI : 10.1007/978-3-642-11207-2_9
A Visualisation Tool for Evaluating Access Control Policies in Facebook-style Social Network Systems, Proc. of the 27th Annual ACM Symposium on Applied Computing (SAC'2012, pp.1443-1450, 2012. ,
Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.22-33, 2010. ,
DOI : 10.1145/1850795.1850798
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.375.3117
A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing, 2011 First International Conference on Data Compression, Communications and Processing, pp.275-284, 2011. ,
DOI : 10.1109/CCP.2011.43
ClockMap: Enhancing Circular Treemaps with Temporal Glyphs for Time-Series Data, Proceedings of the Eurographics Conference on Visualization (EuroVis), pp.97-101, 2012. ,
A Graph-theoretic Visualisation Approach to Network Risk Analysis, Proc. of the 5th International Workshop on Visualisation for Computer Security (VizSec'08), pp.60-67, 2008. ,
NV, Proceedings of the Ninth International Symposium on Visualization for Cyber Security, VizSec '12, 2012. ,
DOI : 10.1145/2379690.2379694
Effective Visualisation of File System Access-Control, Proc. of the 5th international workshop on Visualisation for Computer Security (VizSec'08), pp.18-25, 2008. ,
Improving Attack Graph Visualisation through Data Reduction and Attack Grouping, Proc. of the 5th international workshop on Visualisation for Computer Security (VizSec'08), pp.68-79, 2008. ,
DOI : 10.1007/978-3-540-85933-8_7
URL : http://cis.ksu.edu/~xou/publications/vizsec08.pdf
DAEDALUS-VIZ, Proceedings of the Ninth International Symposium on Visualization for Cyber Security, VizSec '12, 2012. ,
DOI : 10.1145/2379690.2379700
Usability Evaluation Based on International Standards for Software Quality Evaluation, Nec Technical Journal, vol.3, issue.2, 2008. ,
Attack Modeling and Security Evaluation in SIEM Systems, International Transactions on Systems Science and Applications, vol.8, pp.129-147, 2012. ,
DOI : 10.1109/greencom.2012.24
NVisionIP, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.65-72, 2004. ,
DOI : 10.1145/1029208.1029219
The Spinning Cube of Potential Doom, Communications of the ACM, vol.47, issue.6, pp.24-26, 2004. ,
DOI : 10.1145/990680.990699
Visual firewall: real-time network security monitor, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)., pp.129-136, 2005. ,
DOI : 10.1109/VIZSEC.2005.1532075
Visual analysis of complex firewall configurations, Proceedings of the Ninth International Symposium on Visualization for Cyber Security, VizSec '12, 2012. ,
DOI : 10.1145/2379690.2379691
Applied Security Visualisation, NY, 2008. ,
Information Visualisation for Rule-based Resource Access Control, Proc. of International Symposium on Usable Privacy and Security (SOUPS), 2006. ,
Multiple Coordinated Views for Network Attack Graphs, Proc. of the IEEE Workshops on Visualisation for Computer Security, p.12, 2005. ,
DOI : 10.1109/vizsec.2005.1532071
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.7407
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.160-169, 2005. ,
DOI : 10.1109/CSAC.2005.58
Analytical Visualization Techniques for Security Information and Event Management, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, pp.519-525, 2013. ,
DOI : 10.1109/PDP.2013.84
IP Matrix: an effective visualization framework for cyber threat monitoring RedSeal Networks Vulnerability & Risk Management Solution, Proc. of the 9th International Conference on Information Visualization (IV05), pp.678-685, 2005. ,
DOI : 10.1109/iv.2005.67
An evaluation of space-filling information visualizations for depicting hierarchical structures, International Journal of Human-Computer Studies, vol.53, issue.5, pp.663-694, 2000. ,
DOI : 10.1006/ijhc.2000.0420
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior, VizSEC 2007: Proc. of the 2007 Workshop on Visualization for Computer Security, pp.101-114, 2008. ,
DOI : 10.1007/978-3-540-78243-8_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.132
PolicyVis: Firewall Security Policy Visualisation and Inspection, Proc. of the 21st Conference on Large Installation System Administration Conference (LISA'07), USENIX Association, pp.1-16, 2007. ,
An Interactive Attack Graph Cascade and Reachability Display, Proc. of the Workshop on Visualisation for Computer Security, pp.221-236, 2007. ,
DOI : 10.1007/978-3-540-78243-8_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.2560
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool, Proc. of the 5th International Workshop on Visualisation for Computer Security (VizSec'08), pp.44-59, 2008. ,
DOI : 10.1007/978-3-540-85933-8_5