A User-centered Look at Glyph-based Security Visualization

Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi. A User-centered Look at Glyph-based Security Visualization. In Kwan-Liu Ma, Stephen C. North, William Yurcik, editors, IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 26 October 2005, Minneapolis, MN, USA. pages 3, IEEE Computer Society, 2005. [doi]

@inproceedings{KomlodiRAGJ05,
  title = {A User-centered Look at Glyph-based Security Visualization},
  author = {Anita Komlodi and Penny Rheingans and Utkarsha Ayachit and John R. Goodall and Amit Joshi},
  year = {2005},
  doi = {10.1109/VIZSEC.2005.1},
  url = {http://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.1},
  tags = {rule-based, security},
  researchr = {https://researchr.org/publication/KomlodiRAGJ05},
  cites = {0},
  citedby = {0},
  pages = {3},
  booktitle = {IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 26 October 2005, Minneapolis, MN, USA},
  editor = {Kwan-Liu Ma and Stephen C. North and William Yurcik},
  publisher = {IEEE Computer Society},
  isbn = {0-7803-9477-1},
}