Abstract is missing.
- Visualization of actionable knowledge to mitigate DRDoS attacksMichaël Aupetit, Yury Zhauniarovich, Giorgos Vasiliadis, Marc Dacier, Yazan Boshmaf. 1-8 [doi]
- Understanding the context of network traffic alertsBram C. M. Cappers, Jarke J. van Wijk. 1-8 [doi]
- V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policiesRobert Gove. 1-8 [doi]
- Visually guided flow tracking in software-defined networkingTobias Post, Thomas Wischgoll, Adam R. Bryant, Bernd Hamann, Paul Müller, Hans Hagen. 1-4 [doi]
- Mixed method approach to identify analytic questions to be visualized for military cyber incident handlersLaurin Buchanan, Anita D'Amico, Drew Kirkpatrick. 1-8 [doi]
- J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecodeMd. Jawaherul Alam, Michael T. Goodrich, Timothy Johnson. 1-8 [doi]
- CyberPetri at CDX 2016: Real-time network situation awarenessDustin Arendt, Daniel M. Best, Russ Burtner, Celeste Lyn Paul. 1-4 [doi]
- Visualizing a Malware Distribution NetworkSebastian Peryt, Jose Andre Morales, William Casey, Aaron Volkmann, Bud Mishra, Yang Cai. 1-4 [doi]
- Detecting malicious logins in enterprise networks using visualizationHossein Siadati, Bahador Saket, Nasir D. Memon. 1-8 [doi]
- Cesar: Visual representation of source code vulnerabilitiesHala Assal, Sonia Chiasson, Robert Biddle. 1-8 [doi]
- Uncovering periodic network signals of cyber attacksHuynh Ngoc Anh, Wee Keong Ng, Alex Ulmer, Jörn Kohlhammer. 1-8 [doi]
- Bigfoot: A geo-based visualization methodology for detecting BGP threatsMeenakshi Syamkumar, Ramakrishnan Durairajan, Paul Barford. 1-8 [doi]