Biblio

Export 4 results:
Sort by: [ Author (Desc)] Title Type Year
Filters: Author is Fink, G.  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Fink G, North C, Endert A, Rose S. Visualizing cyber security: Usable workspaces. In: Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. ; 2009. p. 45 -56. PDF (3.67 MB)
Fink G, Duggirala V, Correa R, North C. Bridging the host-network divide: survey, taxonomy, and solution. In: LISA '06: Proceedings of the 20th conference on Large Installation System Administration. LISA '06: Proceedings of the 20th conference on Large Installation System Administration. Berkeley, CA, USA; 2006. p. 20–20. PDF (958.82 KB)
Fink G, North C. Root Polar Layout of Internet Address Data for Security Administration. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 7. PDF (1.94 MB)
Fink G, Muessig P, North C. Visual Correlation of Host Processes and Network Traffic. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 2. PDF (2.05 MB)