Abstract is missing.
- Visual Reverse Engineering of Binary and Data FilesGregory J. Conti, Erik Dean, Matthew Sinda, Benjamin Sangster. 1-17 [doi]
- Effective Visualization of File System Access-ControlAlexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia. 18-25 [doi]
- Visual Analysis of Program Flow Data with Data PropagationYing Xia, Kevin Fairbanks, Henry Owen. 26-35 [doi]
- A Term Distribution Visualization Approach to Digital Forensic String SearchMoses Schwartz, Lorie M. Liebrock. 36-43 [doi]
- GARNET: A Graphical Attack Graph and Reachability Network Evaluation ToolLeevar Williams, Richard Lippmann, Kyle Ingols. 44-59 [doi]
- A Graph-Theoretic Visualization Approach to Network Risk AnalysisScott O Hare, Steven Noel, Kenneth Prole. 60-67 [doi]
- Improving Attack Graph Visualization through Data Reduction and Attack GroupingJohn Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen. 68-79 [doi]
- Show Me How You See: Lessons from Studying Computer Forensics Experts for VisualizationT. J. Jankun-Kelly, Josh Franck, David Wilson, Jeffery Carver, David Dampier, J. Edward Swan. 80-86 [doi]
- A Task Centered Framework for Computer Security Data VisualizationXiaoyuan Suo, Ying Zhu, G. Scott Owen. 87-94 [doi]
- BGPeep: An IP-Space Centered View for Internet Routing DataJames Shearer, Kwan-Liu Ma, Toby Kohlenberg. 95-110 [doi]
- Large-Scale Network Monitoring for Visual Analysis of AttacksFabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel. 111-118 [doi]
- Visualizing Real-Time Network Resource UsageRyan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman. 119-135 [doi]
- Wireless Cyber Assets Discovery VisualizationKenneth Prole, John R. Goodall, Anita D. D Amico, Jason K. Kopylec. 136-143 [doi]
- NetFlow Data Visualization Based on GraphsPavel Minarík, Tomás Dymácek. 144-151 [doi]
- Backhoe, a Packet Trace and Log BrowserSergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina. 152-160 [doi]
- Existence Plots: A Low-Resolution Time Series for Port Behavior AnalysisJeff Janies. 161-168 [doi]
- Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort AlertsShahrulniza Musa, David J. Parish. 169-180 [doi]
- Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security EventsGrant Vandenberghe. 181-196 [doi]