Biblio

Export 7 results:
Sort by: Author Title Type [ Year (Desc)]
Filters: Author is Fink, G.  [Clear All Filters]
2011
North C, Chang R, Endert A, Dou W, May R, Pike B, Fink G. Analytic provenance: process+interaction+insight. In: Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. New York, NY, USA; 2011. p. 33–36. Available from: http://doi.acm.org/10.1145/1979742.1979570 p33-north.pdf (302 KB)
2010
Hui P, Bruce J, Fink G, Gregory M, Best D, McGrath L, Endert A. Towards efficient collaboration in cyber security. In: Collaborative Technologies and Systems (CTS), 2010 International Symposium on. Collaborative Technologies and Systems (CTS), 2010 International Symposium on. ; 2010. p. 489 -498. PDF (397.22 KB)
2009
Fink G, North C, Endert A, Rose S. Visualizing cyber security: Usable workspaces. In: Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. ; 2009. p. 45 -56. PDF (3.67 MB)
2006
Fink G, Duggirala V, Correa R, North C. Bridging the host-network divide: survey, taxonomy, and solution. In: LISA '06: Proceedings of the 20th conference on Large Installation System Administration. LISA '06: Proceedings of the 20th conference on Large Installation System Administration. Berkeley, CA, USA; 2006. p. 20–20. PDF (958.82 KB)
2005
Fink G, North C. Root Polar Layout of Internet Address Data for Security Administration. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 7. PDF (1.94 MB)
Fink G, Muessig P, North C. Visual Correlation of Host Processes and Network Traffic. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 2. PDF (2.05 MB)
2004
Ball R, Fink G, North C. Home-centric visualization of network traffic for security administration. In: VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. New York, NY, USA; 2004. p. 55–64. PDF (1.8 MB)