default search action
VizSEC 2014: Paris, France
- Kirsten Whitley, Sophie Engle, Lane Harrison, Fabian Fischer, Nicolas Prigent:
11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014. ACM 2014, ISBN 978-1-4503-2826-5 - Siming Chen, Cong Guo, Xiaoru Yuan, Fabian Merkle, Hanna Schäfer, Thomas Ertl:
OCEANS: online collaborative explorative analysis on network security. 1-8 - Markus Wagner, Wolfgang Aigner, Alexander Rind, Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato:
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis. 9-16 - Simon J. Walton, Eamonn Maguire, Min Chen:
Multiple queries with conditional attributes (QCATs) for anomaly detection and visualization. 17-24 - Tobias Wüchner, Alexander Pretschner, Martín Ochoa:
DAVAST: data-centric system level activity visualization. 25-32 - Daniel M. Best, Alex Endert, Daniel Kidwell:
7 key challenges for visualization in cyber network defense. 33-40 - Jan-Erik Stange, Marian Dörk, Johannes Landstorfer, Reto Wettach:
Visual filter: graphical exploration of network security log files. 41-48 - Diane Staheli, Tamara Yu, R. Jordan Crouser, Suresh Damodaran, Kevin Nam, B. David O'Gwynn, Sean McKenna, Lane Harrison:
Visualization evaluation for cyber security: trends and future directions. 49-56 - Christopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk:
CORGI: combination, organization and reconstruction through graphical interactions. 57-64 - Fabian Fischer, Daniel A. Keim:
NStreamAware: real-time visual analytics for data streams to enhance situational awareness. 65-72 - Robert Gove, Joshua Saxe, Sigfried Gold, Alexander Long, Giacomo Bergamo:
SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis. 72-79 - J. Joseph Fowler, Thienne M. Johnson, Paolo Simonetto, Michael Schneider, Carlos Acedo, Stephen G. Kobourov, Loukas Lazos:
IMap: visualizing network activity over internet maps. 80-87 - Alexander Long, Joshua Saxe, Robert Gove:
Detecting malware samples with similar image sets. 88-95
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.