Abstract is missing.
- User re-authentication via mouse movementsMaja Pusara, Carla E. Brodley. 1-8 [doi]
- HMM profiles for network traffic classificationCharles V. Wright, Fabian Monrose, Gerald M. Masson. 9-15 [doi]
- MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequencesGaurav Tandon, Philip K. Chan, Debasis Mitra. 16-25 [doi]
- VisFlowConnect: netflow visualizations of link relationships for security situational awarenessXiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju. 26-34 [doi]
- Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGPSoon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu. 35-44 [doi]
- Passive visual fingerprinting of network attack toolsGregory J. Conti, Kulsoom Abdullah. 45-54 [doi]
- Home-centric visualization of network traffic for security administrationRobert Ball, Glenn A. Fink, Chris North. 55-64 [doi]
- NVisionIP: netflow visualizations of system state for security situational awarenessKiran Lakkaraju, William Yurcik, Adam J. Lee. 65-72 [doi]
- PortVis: a tool for port-based detection of security eventsJonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen. 73-81 [doi]
- Visualizing windows executable viruses using self-organizing mapsInSeon Yoo. 82-89 [doi]
- CyberSeer: 3D audio-visual immersion for network security and managementChristos Papadopoulos, Chris Kyriakakis, Alexander A. Sawchuk, Xinming He. 90-98 [doi]
- Combining a bayesian classifier with visualisation: understanding the IDSStefan Axelsson. 99-108 [doi]
- Managing attack graph complexity through visual hierarchical aggregationSteven Noel, Sushil Jajodia. 109-118 [doi]
- Scatter (and other) plots for visualizing user profiling data and network trafficThomas Goldring. 119-123 [doi]
- Scalable visualization of propagating internet phenomenaAlfonso Valdes, Martin W. Fong. 124-127 [doi]
- Email archive analysis through graphical visualizationWei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo. 128-132 [doi]
- NVisionCC: a visualization framework for high performance cluster securityWilliam Yurcik, Xin Meng, Nadir Kiyanclar. 133-137 [doi]
- Statistical profiling and visualization for detection of malicious insider attacks on computer networksJeffrey B. Colombe, Gregory Stephens. 138-142 [doi]
- SnortView: visualization system of snort logsHideki Koike, Kazuhiro Ohno. 143-147 [doi]