Biblio

Export 7 results:
Sort by: Author [ Title (Asc)] Type Year
Filters: First Letter Of Last Name is F and Author is Fink, G.  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
North C, Chang R, Endert A, Dou W, May R, Pike B, Fink G. Analytic provenance: process+interaction+insight. In: Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. New York, NY, USA; 2011. p. 33–36. Available from: http://doi.acm.org/10.1145/1979742.1979570 p33-north.pdf (302 KB)
B
Fink G, Duggirala V, Correa R, North C. Bridging the host-network divide: survey, taxonomy, and solution. In: LISA '06: Proceedings of the 20th conference on Large Installation System Administration. LISA '06: Proceedings of the 20th conference on Large Installation System Administration. Berkeley, CA, USA; 2006. p. 20–20. PDF (958.82 KB)
H
Ball R, Fink G, North C. Home-centric visualization of network traffic for security administration. In: VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security. New York, NY, USA; 2004. p. 55–64. PDF (1.8 MB)
R
Fink G, North C. Root Polar Layout of Internet Address Data for Security Administration. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 7. PDF (1.94 MB)
T
Hui P, Bruce J, Fink G, Gregory M, Best D, McGrath L, Endert A. Towards efficient collaboration in cyber security. In: Collaborative Technologies and Systems (CTS), 2010 International Symposium on. Collaborative Technologies and Systems (CTS), 2010 International Symposium on. ; 2010. p. 489 -498. PDF (397.22 KB)
V
Fink G, Muessig P, North C. Visual Correlation of Host Processes and Network Traffic. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 2. PDF (2.05 MB)
Fink G, North C, Endert A, Rose S. Visualizing cyber security: Usable workspaces. In: Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. ; 2009. p. 45 -56. PDF (3.67 MB)