Biblio
Export 4 results:
Sort by: [ Author] Title Type Year Filters: Author is Fink, G. [Clear All Filters]
Visualizing cyber security: Usable workspaces. In: Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. ; 2009. p. 45 -56. PDF (3.67 MB)
. Bridging the host-network divide: survey, taxonomy, and solution. In: LISA '06: Proceedings of the 20th conference on Large Installation System Administration. LISA '06: Proceedings of the 20th conference on Large Installation System Administration. Berkeley, CA, USA; 2006. p. 20–20. PDF (958.82 KB)
. Root Polar Layout of Internet Address Data for Security Administration. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 7. PDF (1.94 MB)
. Visual Correlation of Host Processes and Network Traffic. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 2. PDF (2.05 MB)
.