Visualizing cyber security: Usable workspaces
Fink, G.A., North, C.L., Endert, A., Rose, S.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Visualizing compiled executables for malware analysis
Quist, D.A., Liebrock, L.M.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Visual analysis of malware behavior using treemaps and thread graphs
Trinius, Philipp, Holz, Thorsten, Gobel, Jan, Freiling, Felix C.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Keynote address: Visual tools for security: Is there a there there?
Cheswick, B.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Visualization is better! A comparative evaluation
Goodall, J.R.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Over flow: An overview visualization for network analysis
Glanfield, J., Brooks, S., Taylor, T., Paterson, D., Smith, C., Gates, C., McHugh, J.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Visualization of complex attacks and state of attacked network
Yelizarov, A., Gamayunov, D.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Visualizing keyboard pattern passwords
Schweitzer, D., Boleng, J., Hughes, C., Murphy, L.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Visualizing firewall configurations using created voids
Morrissey, S.P., Grinstein, G.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Message from the workshop chairs
Frincke, Deborah A., Gates, Carrie E., Goodall, John R.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
A visual analytic framework for exploring relationships in textual contents of digital forensics evidence
Jankun-Kelly, T.J., Wilson, D., Stamps, A.S., Franck, J., Carver, J., Swan, J.E.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding
Security visualization tools and IPv6 addresses
Barrera, D., van Oorschot, P.C.
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Published in 2009 6th International Workshop on Visualization for Cyber Security (01.10.2009)
Get full text
Conference Proceeding