Biblio
Export 8 results:
Sort by: [ Author
Filters: First Letter Of Last Name is F [Clear All Filters]
Temporal, geographical and categorical aggregations viewed through coordinated displays: a case study with highway incident data. In: NPIVM '99: Proceedings of the 1999 workshop on new paradigms in information visualization and manipulation in conjunction with the eighth ACM internation conference on Information and knowledge management. NPIVM '99: Proceedings of the 1999 workshop on new paradigms in information visualization and manipulation in conjunction with the eighth ACM internation conference on Information and knowledge management. New York, NY, USA; 1999. p. 26–34.
. Toward a visualization-supported workflow for cyber alert management using threat models and human-centered design. In: 2017 IEEE Symposium on Visualization for Cyber Security (VizSec). 2017 IEEE Symposium on Visualization for Cyber Security (VizSec). Phoenix, AZ; 2017. p. 1-8.
Franklin et al Toward a Visualization-Supported Workflow for Cyber Alert Management.pdf (250.01 KB)
. 
Bridging the host-network divide: survey, taxonomy, and solution. In: LISA '06: Proceedings of the 20th conference on Large Installation System Administration. LISA '06: Proceedings of the 20th conference on Large Installation System Administration. Berkeley, CA, USA; 2006. p. 20–20.
PDF (958.82 KB)
. 
Visualizing cyber security: Usable workspaces. In: Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. ; 2009. p. 45 -56.
PDF (3.67 MB)
. 
Root Polar Layout of Internet Address Data for Security Administration. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 7.
PDF (1.94 MB)
. 
Visual Correlation of Host Processes and Network Traffic. In: VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. VIZSEC '05: Proceedings of the IEEE Workshops on Visualization for Computer Security. Washington, DC, USA; 2005. p. 2.
PDF (2.05 MB)
. 
Bixplorer: Visual Analytics with Biclusters. Computer. 2013;46(8):90 - 94.
bixplorer.pdf (1.55 MB)
. 
The Value of Information Visualization. 2008:1–18.
PDF (1.98 MB)
. 