Abstract is missing.
- Title Page [doi]
- Preface [doi]
- Copyright [doi]
- Committees [doi]
- IDS RainStorm: Visualizing IDS AlarmsKulsoom Abdullah, Christopher P. Lee, Gregory J. Conti, John A. Copeland, John T. Stasko. 1 [doi]
- Visual Correlation of Host Processes and Network TrafficGlenn A. Fink, Paul Muessig, Chris North. 2 [doi]
- A User-centered Look at Glyph-based Security VisualizationAnita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi. 3 [doi]
- A Visualization Methodology for Characterization of Network ScansChris Muelder, Kwan-Liu Ma, Tony Bartoletti. 4 [doi]
- IDGraphs: Intrusion Detection and Analysis Using HistographsPin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson. 5 [doi]
- Preserving the Big Picture: Visual Network Traffic Analysis with TNJohn R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi. 6 [doi]
- Root Polar Layout of Internet Address Data for Security AdministrationGlenn A. Fink, Chris North. 7 [doi]
- Visualization of Automated Trust NegotiationDanfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough. 8 [doi]
- Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security VisualizationsKiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North. 9 [doi]
- Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic QueriesGregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen. 10 [doi]
- Visualizing Cyber Attacks using IP MatrixHideki Koike, Kazuhiro Ohno, Kanba Koizumi. 11 [doi]
- Multiple Coordinated Views for Network Attack GraphsSteven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia. 12 [doi]
- Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons LearnedAnita D Amico, Michael Kocka. 13 [doi]
- Exploring Three-dimensional Visualization for Intrusion DetectionAdam Oline, Dirk Reiners. 14 [doi]
- Designing Visualization Capabilities for IDS ChallengesRobert F. Erbacher, Kim Christensen, Amanda Sundberg. 15 [doi]
- Visual Firewall: Real-time Network Security MonitoChristopher P. Lee, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland. 16 [doi]