Detecting Flaws and Intruders with Visual Data Analysis
IEEE Computer Graphics and Applications
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
11th ACM Conference on Computer and Communications Security 2004
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
A Visual Exploration Process for the Analysis of Internet Routing Data
Proceedings of the 14th IEEE Visualization 2003 (VIS'03)
IEEE Workshops on Visualization for Computer Security - Cover
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
A Visualization Methodology for Characterization of Network Scans
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
Interactive visualization for network and port scan detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Using visualization to teach security
Journal of Computing Sciences in Colleges
Database and database application security
ITiCSE '09 Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education
Designing web labs for teaching security concepts
Journal of Computing Sciences in Colleges
SPTrack: visual analysis of information flows within SELinux policies and attack logs
AMT'12 Proceedings of the 8th international conference on Active Media Technology
Hi-index | 0.00 |