Biblio

Export 7 results:
Sort by: Author [ Title (Desc)] Type Year
Filters: Author is Fink, G.  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
Fink G, North C, Endert A, Rose S. Visualizing cyber security: Usable workspaces. In: Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. ; 2009. p. 45 -56. PDF (3.67 MB)
Fink G, Muessig P, North C. Visual Correlation of Host Processes and Network Traffic. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 2. PDF (2.05 MB)
T
Hui P, Bruce J, Fink G, Gregory M, Best D, McGrath L, Endert A. Towards efficient collaboration in cyber security. In: Collaborative Technologies and Systems (CTS), 2010 International Symposium on. Collaborative Technologies and Systems (CTS), 2010 International Symposium on. ; 2010. p. 489 -498. PDF (397.22 KB)
R
Fink G, North C. Root Polar Layout of Internet Address Data for Security Administration. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 7. PDF (1.94 MB)
H
Ball R, Fink G, North C. Home-centric visualization of network traffic for security administration. In: VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. New York, NY, USA; 2004. p. 55–64. PDF (1.8 MB)
B
Fink G, Duggirala V, Correa R, North C. Bridging the host-network divide: survey, taxonomy, and solution. In: LISA '06: Proceedings of the 20th conference on Large Installation System Administration. LISA '06: Proceedings of the 20th conference on Large Installation System Administration. Berkeley, CA, USA; 2006. p. 20–20. PDF (958.82 KB)
A
North C, Chang R, Endert A, Dou W, May R, Pike B, Fink G. Analytic provenance: process+interaction+insight. In: Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. New York, NY, USA; 2011. p. 33–36. Available from: http://doi.acm.org/10.1145/1979742.1979570 p33-north.pdf (302 KB)