Biblio

Export 10 results:
Sort by: [ Author (Desc)] Title Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E [F] G H I J K L M N O P Q R S T U V W X Y Z   [Show ALL]
F
Fredrikson A, North C, Plaisant C, Shneiderman B. Temporal, geographical and categorical aggregations viewed through coordinated displays: a case study with highway incident data. In: NPIVM '99: Proceedings of the 1999 workshop on new paradigms in information visualization and manipulation in conjunction with the eighth ACM internation conference on Information and knowledge management. NPIVM '99: Proceedings of the 1999 workshop on new paradigms in information visualization and manipulation in conjunction with the eighth ACM internation conference on Information and knowledge management. New York, NY, USA; 1999. p. 26–34.
Franklin L, Pirrung M, Blaha L, Dowling M, Feng M. Toward a visualization-supported workflow for cyber alert management using threat models and human-centered design. In: 2017 IEEE Symposium on Visualization for Cyber Security (VizSec). 2017 IEEE Symposium on Visualization for Cyber Security (VizSec). Phoenix, AZ; 2017. p. 1-8. Franklin et al Toward a Visualization-Supported Workflow for Cyber Alert Management.pdf (250.01 KB)
Fink G, Duggirala V, Correa R, North C. Bridging the host-network divide: survey, taxonomy, and solution. In: LISA '06: Proceedings of the 20th conference on Large Installation System Administration. LISA '06: Proceedings of the 20th conference on Large Installation System Administration. Berkeley, CA, USA; 2006. p. 20–20. PDF (958.82 KB)
Fink G, North C, Endert A, Rose S. Visualizing cyber security: Usable workspaces. In: Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. ; 2009. p. 45 -56. PDF (3.67 MB)
Fink G, North C. Root Polar Layout of Internet Address Data for Security Administration. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 7. PDF (1.94 MB)
Fink G, Muessig P, North C. Visual Correlation of Host Processes and Network Traffic. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 2. PDF (2.05 MB)
Fiaux P, Sun M, Bradel L, North C, Ramakrishnan N, Endert A. Bixplorer: Visual Analytics with Biclusters. Computer. 2013;46(8):90 - 94. bixplorer.pdf (1.55 MB)
Fekete J-D, Wijk JJ, Stasko JT, North C. The Value of Information Visualization. 2008:1–18. PDF (1.98 MB)
Faust R, Scheidegger C, Isaacs K, Bernstein WZ, Sharp M, North C. Interactive Visualization for Data Science Scripts. In: 2022 IEEE Visualization in Data Science (VDS). 2022 IEEE Visualization in Data Science (VDS). Los Alamitos, CA, USA; 2022. p. 37-45. Available from: https://doi.ieeecomputersociety.org/10.1109/VDS57266.2022.00009 Interactive_Visualization_for_Data_Science_Scripts-compressed.pdf (961.35 KB)
Faust R, Scheidegger C, North C. Aardvark: Comparative Visualization of Data Analysis Scripts. In: Symposium on Visualization in Data Science (VDS) at IEEE VIS. Symposium on Visualization in Data Science (VDS) at IEEE VIS. ; 2023. p. 30-38. Aardvark_VDS copy.pdf (491.68 KB)