Abstract is missing.
- EMBER: a global perspective on extreme malicious behaviorTamara Yu, Richard Lippmann, James Riordan, Stephen W. Boyer. 1-12 [doi]
- Proposing a multi-touch interface for intrusion detection environmentsJeffrey Guenther, Fred Volk, Mark Shaneck. 13-21 [doi]
- Visualizing attack graphs, reachability, and trust relationships with NAVIGATORMatthew Chu, Kyle Ingols, Richard Lippmann, Seth E. Webster, Stephen W. Boyer. 22-33 [doi]
- Visualizing graph dynamics and similarity for enterprise network security and managementQi Liao, Aaron Striegel, Nitesh V. Chawla. 34-45 [doi]
- Visual analysis of code securityJohn R. Goodall, Hassan Radwan, Lenny Halseth. 46-51 [doi]
- PeekKernelFlows: peeking into IP flowsCynthia Wagner, GĂ©rard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel. 52-57 [doi]
- Visualizing host traffic through graphsEduard Glatz. 58-63 [doi]
- Visualizing your key for secure phone calls and language independenceMichael Oehler, Dhananjay S. Phatak, F. John Krautheim. 64-69 [doi]
- Traffic classification using visual motifs: an empirical evaluationWilson Lian, Fabian Monrose, John McHugh. 70-78 [doi]
- Real-time visualization of network behaviors for situational awarenessDaniel M. Best, Shawn Bohn, Douglas Love, Adam Wynne, William A. Pike. 79-90 [doi]
- Interactive detection of network anomalies via coordinated multiple viewsLane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang, Xintao Wu. 91-101 [doi]
- Nimble cybersecurity incident management through visualization and defensible recommendationsJamie C. Rasmussen, Kate Ehrlich, Steven I. Ross, Susanna E. Kirk, Daniel M. Gruen, John F. Patterson. 102-113 [doi]