Abstract is missing.
- Visual analysis of complex firewall configurationsFlorian Mansmann, Timo Göbel, William R. Cheswick. 1-8 [doi]
- Automated tracing and visualization of software security structure and propertiesWenbin Fang, Barton P. Miller, James A. Kupsch. 9-16 [doi]
- Visualization design for immediate high-level situational assessmentRobert F. Erbacher. 17-24 [doi]
- NV: Nessus vulnerability visualization for the webLane Harrison, Riley Spahn, Michael D. Iannacone, Evan Downing, John R. Goodall. 25-32 [doi]
- Visualization of shared system call sequence relationships in large malware corporaJoshua Saxe, David Mentis, Christopher Greamo. 33-40 [doi]
- MalwareVis: entity-based visualization of malware network tracesWei Zhuo, Yacin Nadji. 41-47 [doi]
- Change-Link: a digital forensic tool for visualizing changes to directory treesTimothy R. Leschke, Alan T. Sherman. 48-55 [doi]
- Visualizing distributed memory computations with hive plotsSophie Engle, Sean Whalen. 56-63 [doi]
- Visual spam campaigns analysis using abstract graphs representationOrestis Tsigkas, Olivier Thonnard, Dimitrios Tzovaras. 64-71 [doi]
- DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert systemDaisuke Inoue, Masashi Eto, Koei Suzuki, Mio Suzuki, Koji Nakao. 72-79 [doi]
- VisTracer: a visual analytics tool to investigate routing anomalies in traceroutesFabian Fischer, Johannes Fuchs, Pierre-Antoine Vervier, Florian Mansmann, Olivier Thonnard. 80-87 [doi]
- Visualizing semantics in passwords: the role of datesRafael Veras, Julie Thorpe, Christopher Collins. 88-95 [doi]