Sold Out
Book Categories |
Introduction to visualization for computer security J. R. Goodall Goodall, J. R. 1
The real work of computer network defense analysts A. D'Amico D'Amico, A. K. Whitley Whitley, K. 19
Adapting personas for use in security visualization design J. Stoll Stoll, J. D. McColgin McColgin, D. M. Gregory Gregory, M. V. Crow Crow, V. W. K. Edwards Edwards, W. K. 39
Measuring the complexity of computer security visualization designs X. Suo Suo, X. Y. Zhu Zhu, Y. G. Scott Owen Owen, G. Scott 53
Integrated environment management for information operations testbeds T. H. Yu Yu, T. H. B. W. Fuller Fuller, B. W. J. H. Bannick Bannick, J. H. L. M. Rossey Rossey, L. M. R. K. Cunningham Cunningham, R. K. 67
Visual analysis of network flow data with timelines and event plots D. Phan Phan, D. J. Gerth Gerth, J. M. Lee Lee, M. A. Paepcke Paepcke, A. T. Winograd Winograd, T. 85
NetBytes Viewer : an entity-based NetFlow visualization utility for identifying intrusive behavior T. Taylor Taylor, T. S. Brooks Brooks, S. J. McHugh McHugh, J. 101
Visual analysis of corporate network intelligence : abstracting and reasoning on yesterdays for acting today D. Lalanne Lalanne, D. E. Bertini Bertini, E. P. Hertzog Hertzog, P. P. Bados Bados, P. 115
Visualizing network security events using compound glyphs from a service-oriented perspective J. Pearlman Pearlman, J. P. Rheingans Rheingans, P. 131
High level Internet scale traffic visualization using Hilbert curve mapping B. Irwin Irwin, B. N. Pilkington Pilkington, N. 147
VisAlert : from idea to product S. Foresti Foresti, S. J. Agutter Agutter, J. 159
Visually understanding jam resistant communication D. Schweitzer Schweitzer, D. L. BairdBaird, L. W. Bahn Bahn, W. 175
Visualization of host behavior for network security F. Mansman Mansman, F. L. Meier Meier, L. D. A. Klein Klein, D. A. 187
Putting security in context : visual correlation of network activity with real-world information W. A. Pike Pike, W. A. C. Scherrer Scherrer, C. S. Zabriskie Zabriskie, S. 203
An interactive attack graph cascade and reachability display L. Williams Williams, L. R. Lippmann Lippmann, R. K. Ingols Ingols, K. 221
Intelligent classification and visualization of network scans C. Muelder Muelder, C. L. Chen Chen, L. R. Thomason Thomason, R. K.-L. Ma Ma, K.-L. T. Bartoletti Bartoletti, T. 237
Using InetVis to evaluate Snort and Bro Scan detection on a network telescope B. Irwn Irwn, B. J.-P. van Riel van Riel, J.-P. 255
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionVizsec 2007: Proceedings of the Workshop on Visualization for Computer Security
X
This Item is in Your InventoryVizsec 2007: Proceedings of the Workshop on Visualization for Computer Security
X
You must be logged in to review the productsX
X
X
Add Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security, Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicat, Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security to the inventory that you are selling on WonderClubX
X
Add Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security, Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicat, Vizsec 2007: Proceedings of the Workshop on Visualization for Computer Security to your collection on WonderClub |