Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi. A User-centered Look at Glyph-based Security Visualization. In Kwan-Liu Ma, Stephen C. North, William Yurcik, editors, IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 26 October 2005, Minneapolis, MN, USA. pages 3, IEEE Computer Society, 2005. [doi]
@inproceedings{KomlodiRAGJ05, title = {A User-centered Look at Glyph-based Security Visualization}, author = {Anita Komlodi and Penny Rheingans and Utkarsha Ayachit and John R. Goodall and Amit Joshi}, year = {2005}, doi = {10.1109/VIZSEC.2005.1}, url = {http://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.1}, tags = {rule-based, security}, researchr = {https://researchr.org/publication/KomlodiRAGJ05}, cites = {0}, citedby = {0}, pages = {3}, booktitle = {IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 26 October 2005, Minneapolis, MN, USA}, editor = {Kwan-Liu Ma and Stephen C. North and William Yurcik}, publisher = {IEEE Computer Society}, isbn = {0-7803-9477-1}, }